Mobile privacy audits are getting harder
Mobile apps routinely collect and transmit personal data in ways that are difficult for users, developers, and regulators to verify. Permissions can reveal what an…
Mobile apps routinely collect and transmit personal data in ways that are difficult for users, developers, and regulators to verify. Permissions can reveal what an…
Ravie LakshmananFeb 06, 2026Artificial Intelligence / Vulnerability Artificial intelligence (AI) company Anthropic revealed that its latest large language model (LLM), Claude Opus 4.6, has found…
React Native Command Injection Flaw The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2025-11953 to its Known Exploited Vulnerabilities (KEV) catalog, flagging an…
A new spear phishing campaign that weaponizes a forgotten file type to bypass modern defenses. Attackers are luring victims into downloading Windows screensaver (.scr) files,…
REA Group has started offering conversational search capability on its flagship website realestate.com.au after expanding natural language search to half of the site’s visitors. The…
An ongoing spam campaign that leverages social engineering to deploy legitimate Remote Monitoring and Management (RMM) software on victim networks. By disguising malicious payloads as…
Here’s a look at the most interesting products from the past week, featuring releases from Avast, Fingerprint, Gremlin, and Socure. Gremlin launches Disaster Recovery Testing…
Palo Alto Networks’ threat intelligence unit, Unit 42, has released new research detailing the activities of a highly sophisticated state-aligned cyber actor that has compromised…
CentOS 9 Vulnerability A critical use-after-free (UAF) vulnerability in the Linux kernel’s sch_cake queuing discipline (Qdisc) affects CentOS 9, allowing local users to gain root…
Hong Kong is striving to become a “fortress” capable of defending the city from increasingly complex hacking attacks and sophisticated scams. Secretary for Innovation, Technology…
Greek defence authorities have arrested a member of the Greek defence forces accused of leaking “secret information” to “third parties”, the Greek National Defence General…
Three days before Substack told users about a security incident, a very different version of the story was already circulating in underground cyber crime forums.…