DHS Wants a Fleet of AI-Powered Surveillance Trucks
The US Department of Homeland Security is seeking to develop a new mobile surveillance platform that fuses artificial intelligence, radar, high-powered cameras, and wireless networking…
The US Department of Homeland Security is seeking to develop a new mobile surveillance platform that fuses artificial intelligence, radar, high-powered cameras, and wireless networking…
Security researchers are warning that cyber threat actors are abusing a critical vulnerability in Microsoft Windows Server Update Service. The vulnerability, tracked as CVE-2025-59287, involves…
TransparentTribe, a Pakistani-nexus intrusion set active since at least 2013, has intensified its cyber espionage operations targeting Linux-based systems of Indian military and defense organizations.…
The financial industry is transforming as artificial intelligence (AI) is becoming an integral tool for managing operations, improving decision-making, and mitigating risks. AI for finance…
A widespread exploitation campaign is targeting WordPress websites with GutenKit and Hunk Companion plugins vulnerable to critical-severity, old security issues that can be used to…
As the festive season approaches, organizations are witnessing a disturbing increase in targeted attacks on digital gift card systems. The Jingle Thief campaign, orchestrated by…
U.S. CISA adds Microsoft WSUS, and Adobe Commerce and Magento Open Source flaws to its Known Exploited Vulnerabilities catalog Pierluigi Paganini October 24, 2025 U.S. Cybersecurity…
Oct 24, 2025Ravie LakshmananData Breach / Cybercrime The threat actors behind a large-scale, ongoing smishing campaign have been attributed to more than 194,000 malicious domains…
More than 3,000 malicious YouTube videos were used to distribute infostealer malware, according to a new report detailing the operation. Dubbed the “YouTube Ghost Network”…
The cybersecurity landscape experienced a significant shift in July 2025 when threat actors associated with Warlock ransomware began exploiting a critical zero-day vulnerability in Microsoft…
A sophisticated Python-based remote access trojan has emerged in the gaming community, disguising itself as a legitimate Minecraft client to compromise unsuspecting users. The malware,…
A listing on the dark web data leak site run by the Everest ransomware group claims it holds 576,686 personal records linked to AT&T Careers,…