Why Data Storage is the Key to Securing Smart Meters
Smart meters are at the center of smart energy, designed to support real-time data exchange, remote diagnostics, and dynamic pricing. Built to last for up…
Smart meters are at the center of smart energy, designed to support real-time data exchange, remote diagnostics, and dynamic pricing. Built to last for up…
A sophisticated and widespread smishing campaign originating from China has emerged as a significant threat to users worldwide. Researchers have attributed the ongoing attack to…
Check Point researchers have uncovered, mapped and helped set back a stealthy, large-scale malware distribution operation on YouTube they dubbed the “YouTube Ghost Network.” The…
Bereaved families are calling for a public inquiry over “repeated failures” by the government and online harms regulator Ofcom to effectively deal with a “nihilistic”…
By Ido Shlomo, CTO and Co-Founder, Token Security Agentic AI has arrived. From custom GPTs to autonomous copilots, AI agents now act on behalf of…
Cybersecurity researchers at Arctic Wolf Labs have uncovered a cunning new threat dubbed Caminho, a Brazilian Loader-as-a-Service (LaaS) that’s turning everyday images into Trojan horses…
CVE-2025-61932, an “improper verification of source of a communication channel” vulnerability affecting Lanscope Endpoint Manager, has been exploited as a zero-day since April 2025, the…
The US state of Maryland has launched a statewide Vulnerability Disclosure Programme (VDP) to give ethical hackers the chance to probe systems across its government for…
WazirX, one of India’s popular cryptocurrency exchanges, is set to restart its operations on October 24, nearly 15 months after a cyberattack forced the platform to halt…
Cybersecurity risk management is under growing scrutiny—not just from internal stakeholders but from regulators, auditors, and customers. Yet many organizations still rely on outdated tools…
Researchers have discovered a critical security vulnerability in Perplexity’s Comet AI browser that allows attackers to inject malicious commands through hidden text in screenshots. The…
Palo Alto, California, October 23rd, 2025, CyberNewsWire SquareX released critical research exposing a new class of attack targeting AI browsers. The AI Sidebar Spoofing attack…