-
Security
/ 1 month agoAndroid Banking Trojan Spreads Via Fake IPTV Apps
cybersecurity researchers have disclosed details of a new Android trojan, dubbed “Massiv,” that is engineered to enable device takeover attacks for...
-
Security
/ 1 month agoAI Accelerates Cloud Security Threats from Exposure to Exploitation
Security researchers have documented a significant acceleration in the time between a cloud security misconfiguration and its active exploitation, a shift...
-
Security
/ 1 month agoCritical Security Flaws Emerge in OpenSSL, Foxit, and AI Tools
A series of significant cybersecurity vulnerabilities and incidents were disclosed this week, impacting widely used software and emerging technologies. The developments...
-
Security
/ 1 month agoMicrosoft Patches Windows Admin Center Privilege Escalation Flaw
Microsoft has addressed a high-severity security vulnerability in its Windows Admin Center management platform. The flaw, identified as CVE-2026-26119, could have...
-
Security
/ 1 month agoINTERPOL Operation Red Card 2.0 Nets 651 in Africa Cybercrime Sweep
An international law enforcement operation targeting online financial scams across Africa has resulted in 651 arrests and the recovery of over...
-
Security
/ 1 month agoAndroid Malware Uses Google Gemini AI for Persistence
Security researchers have identified a novel Android malware strain that leverages Google’s Gemini artificial intelligence chatbot within its attack sequence. The...
-
Security
/ 1 month agoCRESCENTHARVEST Campaign Deploys RAT Malware Against Iran Protest Supporters
Security researchers have uncovered a new cyber espionage campaign, likely targeting individuals supporting ongoing protests in Iran. The operation, named CRESCENTHARVEST...
-
Security
/ 1 month agoNotepad++ Patches Security Flaw in Update System
The developers of the widely used text editor Notepad++ have released a critical security update to address a vulnerability that allowed...
-
Security
/ 1 month agoReport Highlights AI Implementation Challenges for Tech Teams
Technology teams globally are facing significant challenges in deploying artificial intelligence and automation tools to improve efficiency, according to industry data....
-
Security
/ 1 month agoDell RecoverPoint Zero-Day Exploited by Suspected China-Linked Group
A critical vulnerability in Dell’s data replication software has been actively exploited as a zero-day since mid-2024 by a suspected China-nexus...

