Xi’s new year message to military reveals PLA Cyberspace Force post in South China Sea
China has deployed a section of its mysterious cyberspace force to the South China Sea to remain “ready for action”, with the unit making a…
China has deployed a section of its mysterious cyberspace force to the South China Sea to remain “ready for action”, with the unit making a…
Gemini AI Model Cyberattacks Threat actors have begun leveraging Google’s Gemini API to dynamically generate C# code for multi-stage malware, evading traditional detection methods. The…
The cybercrime group Muddled Libra (aka Scattered Spider, UNC3944). The contents of this rogue VM and activity from the attack provide valuable insight into the…
Promptware Hackers Can Weaponize Google Calendar A new and dangerous class of cyberattack called “Promptware” has been discovered, capable of turning your personal AI assistant…
Lazarus Group’s latest software supply chain operation is using fake recruiter lures and popular open‑source ecosystems to deliver malware to cryptocurrency‑focused developers quietly. The campaign,…
The Hacker NewsFeb 12, 2026Enterprise Security / Breach Prevention A new 2026 market intelligence study of 128 enterprise security decision-makers (available here) reveals a stark…
Adblock Filters Exposes User Location Many internet users believe VPNs make them completely anonymous online. While VPNs hide your IP address and encrypt traffic, a…
A critical vulnerability in the popular WPvivid Backup & Migration plugin is putting more than 800,000 WordPress websites at risk of complete takeover through remote…
Microsoft has introduced new developer tools, updates to developer analytics, and a Web Installer in the Microsoft Store on Windows to help developers build and…
India’s technology ambitions are no longer limited to policy announcements, they are now translating into capital flows, institutional reforms, and global positioning. At the center…
The application security landscape is experiencing its most dramatic transformation since the shift to DevOps and the cloud. AI coding assistants are fundamentally changing how…
LummaStealer, a notorious information-stealing malware, has made a significant comeback following a major law enforcement disruption in 2025. This resurgence is characterized by a shift…