Logitech Options+, G HUB macOS apps break after certificate expires
Logitech’s Options+ and G Hub apps on macOS stopped working after their code-signing certificate expired, leaving users unable to launch them on Apple systems. Options+…
Logitech’s Options+ and G Hub apps on macOS stopped working after their code-signing certificate expired, leaving users unable to launch them on Apple systems. Options+…
A recent phishing campaign is abusing QR codes in a new way, turning simple HTML tables into working codes that redirect users to malicious sites.…
A maximum severity vulnerability dubbed “Ni8mare” allows remote, unauthenticated attackers to take control over locally deployed instances of the N8N workflow automation platform. The security issue is…
ownCloud has urgently urged users of its Community Edition to enable multi-factor authentication (MFA). A threat intelligence report from Hudson Rock highlighted incidents in which…
The hacking group Crimson Collective claims to have access to Brightspeed’s infrastructure and is disconnecting users from the company’s home internet services. The group made…
Taiwan endured a year-long intensified cyber offensive from China in 2025, that targeted the government and critical infrastructure — with an increasing focus on the…
Microsoft is investigating a bug preventing recipients from opening encrypted emails in classic Outlook after a recent update. This known issue affects users who try…
A sophisticated Windows packer known as pkr_mtsi has emerged as a powerful tool for delivering multiple malware families through widespread malvertising campaigns. First detected on…
Diana Schildhouse, chief data and analytics officer at Colgate-Palmolive, describes herself as a data storyteller – but what does that mean in terms of day-to-day…
Misconfigured email routing enables internal-spoofed phishing Pierluigi Paganini January 07, 2026 Attackers exploit misconfigured email routing to spoof internal emails, using PhaaS platforms like Tycoon2FA…
Listen to the article 2 min This audio is auto-generated. Please let us know if you have feedback. The National Institute of Standards and Technology…
CrazyHunter ransomware has emerged as a critical and evolving threat that specifically targets healthcare organizations and sensitive medical infrastructure. This Go-developed malware represents a significant…