Lumma Stealer Leverages Browser Fingerprinting for Data Theft and Stealthy C2 Communications
14
Nov
2025

Lumma Stealer Leverages Browser Fingerprinting for Data Theft and Stealthy C2 Communications

Following the doxxing of Lumma Stealer’s alleged core members last month, the notorious infostealer initially experienced a significant decline in…

Why your security strategy is failing before it even starts
14
Nov
2025

Why your security strategy is failing before it even starts

In this Help Net Security interview, Adnan Ahmed, CISO at Ornua, discusses how organizations can build a cybersecurity strategy that…

Claude, Claude AI Hacking
14
Nov
2025

Claude AI Weaponized To Execute First Autonomous Cyber Espionage Campaign

The AI executed thousands of requests per second. That physically impossible attack tempo, sustained across multiple simultaneous intrusions targeting 30…

Android Photo Frames App Downloads Malware, Giving Hackers Control of The Device Without User Interaction
14
Nov
2025

Android Photo Frames App Downloads Malware, Giving Hackers Control of The Device Without User Interaction

Digital photo frames have become a standard household device for displaying family memories, and most users assume these simple gadgets…

Akira Ransomware Has Extracted $42M After Targeting Hundreds
14
Nov
2025

Akira Ransomware Has Extracted $42M After Targeting Hundreds

A newly updated cybersecurity advisory from federal agencies reveals that the Akira ransomware operation has significantly escalated its campaign, compromising…

Protecting mobile privacy in real time with predictive adversarial defense
14
Nov
2025

Protecting mobile privacy in real time with predictive adversarial defense

Mobile sensors are everywhere, quietly recording how users move, tilt, or hold their phones. The same data that powers step…

Checkout.com Suffers Data Breach as ShinyHunters Attack Cloud Storage
14
Nov
2025

Checkout.com Suffers Data Breach as ShinyHunters Attack Cloud Storage

Payment processor Checkout.com recently experienced a data breach after being targeted by the cybercrime group “ShinyHunters.” The attackers accessed old…

Los Alamos researchers warn AI may upend national security
14
Nov
2025

Los Alamos researchers warn AI may upend national security

For decades, the United States has built its defense posture around predictable timelines for technological progress. That assumption no longer…

Telstra, Optus, TPG build new list of devices causing trouble for triple zero
14
Nov
2025

Telstra, Optus, TPG build new list of devices causing trouble for triple zero

Australia’s top telcos, including TPG Telecom, Telstra and Optus, have quietly moved to establish a shared database of problematic mobile…

DoorDash
14
Nov
2025

DoorDash hit by new data breach in October exposing user information

DoorDash has disclosed a data breach that hit the food delivery platform this October. Beginning yesterday evening, DoorDash, which serves millions of…

Critical Fortinet FortiWeb Vulnerability Exploited in the Wild to Create Admin Accounts
14
Nov
2025

Critical Fortinet FortiWeb Vulnerability Exploited in the Wild to Create Admin Accounts

A critical vulnerability in Fortinet’s FortiWeb Web Application Firewall (WAF) is being actively exploited by threat actors, potentially as a…

Palo Alto PAN-OS Flaw Lets Attackers Force Firewall Reboots via Malicious Packets
14
Nov
2025

Palo Alto PAN-OS Flaw Lets Attackers Force Firewall Reboots via Malicious Packets

Palo Alto Networks has disclosed a denial-of-service vulnerability in its PAN-OS software that allows attackers to force firewalls into unexpected…