New TokenBreak Attack Bypasses AI Model’s with Just a Single Character Change
13
Jun
2025

New TokenBreak Attack Bypasses AI Model’s with Just a Single Character Change

A critical vulnerability that allows attackers to bypass AI-powered content moderation systems using minimal text modifications.  The “TokenBreak” attack demonstrates…

Developers Beware - Sophisticated Phishing Scams Exploit GitHub Device Code Flow to Hijack Tokens
13
Jun
2025

Developers Beware – Sophisticated Phishing Scams Exploit GitHub Device Code Flow to Hijack Tokens

A sophisticated and increasing wave of cyberattacks now targets software developers through a little-known yet legitimate GitHub feature: the OAuth…

Cyber attack downs systems at Marks & Spencer
13
Jun
2025

Fortifying retail: how UK brands can defend against cyber breaches

The recent wave of cyber attacks targeting UK retailers has been a moment of reckoning for the entire retail industry….

China and Taiwan Accuse Each Other for Cyberattacks Against Critical Infrastructure
13
Jun
2025

China and Taiwan Accuse Each Other for Cyberattacks Against Critical Infrastructure

Cross-strait tensions have escalated into a new domain as China and Taiwan engage in unprecedented mutual accusations of cyberwarfare targeting…

Acer Control Center Flaw Lets Attackers Run Malicious Code as Elevated User
13
Jun
2025

Acer Control Center Flaw Lets Attackers Run Malicious Code as Elevated User

A critical security flaw (CVE-2025-5491) in Acer ControlCenter allows remote attackers to execute arbitrary code with NT AUTHORITYSYSTEM privileges via…

Discord
13
Jun
2025

Discord flaw lets hackers reuse expired invites in malware campaign

Hackers are hijacking expired or deleted Discord invite links to redirect users to malicious sites that deliver remote access trojans and…

Acer Control Center Vulnerability Let Attackers Execute Malicious Code as a Privileged User
13
Jun
2025

Acer Control Center Vulnerability Let Attackers Execute Malicious Code as a Privileged User

A severe security vulnerability has been discovered in the Acer Control Center software, which could allow attackers to execute arbitrary…

CBP's Predator Drone Flights Over LA Are a Dangerous Escalation
13
Jun
2025

CBP’s Predator Drone Flights Over LA Are a Dangerous Escalation

On Wednesday, United States Customs and Border Protection confirmed to 404 Media that it has been flying Predator drones over…

Spring Framework Flaw Enables Remote File Disclosure via “Content‑Disposition” Header
13
Jun
2025

Spring Framework Flaw Enables Remote File Disclosure via “Content‑Disposition” Header

A medium-severity reflected file download (RFD) vulnerability (CVE-2025-41234) in VMware’s Spring Framework has been patched, affecting multiple versions of the…

Meta AI logo
13
Jun
2025

Your Meta AI chats might be public, and it’s not a bug

Conversations that people are having with the Meta AI app are being exposed publicly, often without the users realizing it,…

Cyberattacks top list of global business concerns, Kroll finds
13
Jun
2025

Cyberattacks top list of global business concerns, Kroll finds

Listen to the article 3 min This audio is auto-generated. Please let us know if you have feedback. Dive Brief:…

Microsoft 365 Authentication Issues Disrupt User Access Across Multiple Regions
13
Jun
2025

Microsoft 365 Authentication Issues Disrupt User Access Across Multiple Regions

Microsoft 365 users across Asia Pacific, Europe, the Middle East, and Africa are experiencing significant authentication disruptions that are preventing…