Hackers Exploit Google Calendar Invites to Stealthily Stream Victim’s Camera via Zoom
A new era of AI vulnerability has arrived, and it is far more dangerous than simply tricking a chatbot into saying something rude. New research…
A new era of AI vulnerability has arrived, and it is far more dangerous than simply tricking a chatbot into saying something rude. New research…
Vendor noise is already a problem in traditional security testing. AI red teaming has added another layer of confusion, with providers offering everything from consulting…
Threat actors are abusing legitimate remote monitoring tools to hide inside corporate networks and launch ransomware attacks. Net Monitor for Employees Professional is a commercial…
Security teams in large enterprises already spend significant time tracking vulnerabilities across software supply chains, third-party libraries, and internal codebases. Java environments add another layer…
A new global study of chief information security officers (CISOs) suggests that while cyber resilience is increasingly seen as a driver of business growth, significant gaps remain…
Russia Blocked WhatsApp WhatsApp has accused the Russian government of attempting a nationwide block on its messaging service to force over 100 million users onto…
Paragon Spyware Control Panel on LinkedIn An Israeli spyware firm, Paragon Solutions, accidentally exposed its secretive Graphite control panel in a LinkedIn post, drawing sharp…
The Australian Securities and Investments Commission’s top digital and technology leader is set to retire in May, with recruitment underway for a replacement. Joanne Harper…
AMP has deployed over 400 AI agents across the organisation as it looks to the technology to help it embrace new business models within the…
Apple 0-Day Vulnerability Exploited Apple released iOS 26.3 and iPadOS 26.3 on February 11, 2026, patching over 40 vulnerabilities, including a critical zero-day in the…
Apple has released security updates to fix a zero-day vulnerability that was exploited in an “extremely sophisticated attack” targeting specific individuals. Tracked as CVE-2026-20700, the…
Cybersecurity researchers have discovered what they said is the first known malicious Microsoft Outlook add-in detected in the wild. In this unusual supply chain attack…