Consumers feel less judged by AI debt collectors
Debt collection agencies are starting to use automated voice systems and AI-driven messaging to handle consumer calls. These systems help scale outreach, reduce call center…
Debt collection agencies are starting to use automated voice systems and AI-driven messaging to handle consumer calls. These systems help scale outreach, reduce call center…
Mozilla has released an out-of-band security update to address a critical vulnerability affecting its browser. The update, issued as Firefox v147.0.4, resolves a high-impact Heap…
Advantest Corporation has confirmed that it is responding to a cybersecurity incident that may have affected portions of its internal network. The company, listed on the…
DigitStealer’s expanding command-and-control (C2) footprint is exposing more of its backend than its operators likely intended, giving defenders fresh opportunities to track and block new…
On June 1, 2025, Ukraine launched a coordinated drone strike on five airfields inside Russia, disabling or destroying aircrafts. The attack involved more than 100…
MCP servers can silently turn AI assistants into powerful attack platforms, enabling arbitrary code execution, large‑scale data exfiltration, and stealthy user manipulation across both local…
Attackers keep getting in, often through the same predictable weak spots: identity systems, third-party access, and poorly secured perimeter devices. A new threat report from…
OpenAI EVMbench OpenAI, in collaboration with crypto investment firm Paradigm, has introduced EVMbench, a new benchmark designed to evaluate the ability of AI agents to…
Telstra is monitoring its AI investments closely to ensure that the costs don’t start to outweigh the benefits, as it reported a solid result for…
Guardian AI-Penetration Testing Tool A new open-source framework is reshaping how security professionals approach penetration testing by placing multiple large language models directly at the…
Grok and Copilot for Malware Communication A novel attack technique that repurposes mainstream AI assistants, specifically xAI’s Grok and Microsoft Copilot, as covert command-and-control (C2)…
Smart electricity grids supporting vital AI, data centres and national infrastructure require new physical and cyber security standards to address increasingly distributed threats as Australia…