$10K+ Bounty Offered to Hacker Who Can Disconnect Ring Video Doorbells from Amazon Cloud
$10K+ Bounty Offered to Hacker Disconnect Ring from Amazon Cloud A newly launched bug bounty program is offering nearly $18,000 to anyone who can successfully…
$10K+ Bounty Offered to Hacker Disconnect Ring from Amazon Cloud A newly launched bug bounty program is offering nearly $18,000 to anyone who can successfully…
WhatsApp Password Feature (Source: Wabetainfo) WhatsApp has released a new Android update through the Google Play Beta Program, bringing the version up to 2.26.7.8. The…
Google Chrome Emergency Security Update Google has released a critical security update for its Chrome browser, pushing version 145.0.7632.116/117 to Windows and macOS users, while…
Claude Distillation Attacks Anthropic today accused three prominent Chinese artificial intelligence companies DeepSeek, Moonshot AI, and MiniMax of running coordinated “distillation” campaigns to steal advanced…
A threat actor known as GrayCharlie has been compromising WordPress websites since mid-2023, silently embedding malicious JavaScript to push malware onto visiting users. The group…
Conduent Data Breach Conduent Data Breach Notification Letters Sent to Millions as Ransomware Group Claims 8 Terabytes Stolen in One of the Largest U.S. Incidents.…
OWASP Smart Contract Top 10 2026 The Open Web Application Security Project (OWASP) has published the Smart Contract Top 10: 2026, a forward-looking standard awareness…
A sophisticated new cyber campaign has been uncovered, utilizing a deceptive technique known as “ClickFix” to distribute a custom remote access trojan dubbed MIMICRAT. This…
Microsoft is currently investigating a significant service degradation affecting Multi-Factor Authentication (MFA) across its Microsoft 365 suite, with users in the North America region reporting…
A highly sophisticated phishing framework named Starkiller has recently emerged, offering attackers an advanced method to steal credentials and bypass multi-factor authentication. Developed by a…
North Korean nation-state threat actors have been running a two-part operation — posing as job recruiters while embedding fake workers inside real companies. Since at…
Wendy Data Breach A threat actor claimed on February 22, 2026, to have leaked what they are calling the “Wendy’s International Franchise Database,” exposing sensitive…