Building trustworthy technology: How AI and data can improve government
The rise of artificial intelligence (AI) has been met with both excitement and anxiety – a blend of optimism about what could be achieved and…
The rise of artificial intelligence (AI) has been met with both excitement and anxiety – a blend of optimism about what could be achieved and…
Wordfence blocks 8.7M attacks exploiting old GutenKit and Hunk Companion flaws Pierluigi Paganini October 27, 2025 Hackers exploited old RCE flaws in WordPress GutenKit and…
The Australian Competition and Consumer Commission (ACCC) has initiated proceedings in the Federal Court against Microsoft Australia Pty Ltd and its parent company, Microsoft Corporation,…
Attackers are using the open-source red-team tool RedTiger to build an infostealer that collects Discord account data and payment information. The malware can also steal…
Hackers are actively exploiting a critical flaw in Microsoft’s Windows Server Update Services (WSUS), with security researchers reporting widespread attempts in the wild. The vulnerability,…
OpenAI’s ChatGPT, Google’s Gemini, DeepSeek, and xAI’s Grok are pushing Russian state propaganda from sanctioned entities—including citations from Russian state media, sites tied to Russian…
Famous Chollima, a DPRK-aligned threat group, has evolved its arsenal, with BeaverTail and OtterCookie increasingly merging functionalities to steal credentials and cryptocurrency via deceptive job…
Windows 10 Extended Security Updates (ESU) is a paid subscription that provides security patches now that mainstream support of Windows 10 has ended. Free security…
The notorious cybercrime forum BreachForums has resurfaced online, this time on a clearnet domain accessible without specialized tools like Tor. The platform, long a hub…
In the latter half of 2025, the Qilin ransomware group has solidified its standing as a formidable threat, continuing to post details of more than…
The newly released OpenAI Atlas web browser has been found to be susceptible to a prompt injection attack where its omnibox can be jailbroken by…
Dell Technologies has disclosed three critical vulnerabilities in its Storage Manager software that could allow attackers to bypass authentication, disclose sensitive information, and gain unauthorized…