All posts tagged "cybersecurity"
-
Security
/ 4 weeks agoApple Alerts Users to Active Web Exploits on Outdated iPhones
Apple Inc. has begun sending direct Lock Screen notifications to users of iPhones and iPads running outdated software versions. The alerts...
-
Security
/ 4 weeks agoCybersecurity Bulletin: PQC Advances, AI Threats, and Phishing Kits
A recent cybersecurity bulletin highlights a shift towards sophisticated, low-profile threats, including progress in post-quantum cryptography, the weaponization of artificial intelligence...
-
Security
/ 4 weeks agoCybersecurity Experts Study Art Forgery Tactics for Defense
Security researchers are examining historical art forgery techniques to develop new methods for detecting sophisticated cyberattacks. This cross-disciplinary approach draws direct...
-
Security
/ 4 weeks agoClaude Extension Flaw Allowed Zero-Click Prompt Injection
A security vulnerability in Anthropic’s Claude browser extension for Google Chrome could have been exploited to silently inject malicious prompts into...
-
Security
/ 4 weeks agoSecurity Experts Warn of Overconfidence in Cyber Defenses
Security professionals are raising concerns that many organizations may be overestimating the effectiveness of their cybersecurity measures. While security tools are...
-
Security
/ 4 weeks agoNew WebRTC Skimmer Bypasses Security to Steal Payment Data
cybersecurity researchers have identified a novel and sophisticated payment card skimmer that leverages WebRTC data channels to evade standard security defenses...
-
Security
/ 1 month agoMicrosoft 365 Device Code Phishing Campaign Targets Global Orgs
Security researchers have identified an ongoing phishing campaign exploiting Microsoft’s device code authentication to compromise accounts across more than 340 organizations....
-
Security
/ 1 month agoRussian Hacker Jailed for Botnet-Driven Ransomware Scheme
A Russian national has been sentenced to two years in a U.S. federal prison for his role in managing a botnet...
-
Security
/ 1 month agoAI Agent Used in Autonomous Cyber Espionage Campaign
In September 2025, a state-sponsored threat actor used an artificial intelligence coding agent to execute an autonomous cyber espionage campaign. The...
-
Security
/ 1 month agoGlassWorm Malware Uses Solana for Data Theft and RAT Delivery
cybersecurity researchers have identified a significant evolution in the GlassWorm malware campaign, which now employs the Solana blockchain to deliver a...

