FCC IoT labeling program loses lead company after China probe
Listen to the article 3 min This audio is auto-generated. Please let us know if you have feedback. The Federal Communication Commission’s cybersecurity labeling program…
Listen to the article 3 min This audio is auto-generated. Please let us know if you have feedback. The Federal Communication Commission’s cybersecurity labeling program…
NordVPN denied allegations that its internal Salesforce development servers were breached, saying that cybercriminals obtained “dummy data” from a trial account on a third-party automated…
WhatsApp’s multi-device encryption protocol has long leaked metadata, allowing attackers to fingerprint users’ device operating systems, aiding targeted malware delivery. Recent research highlights partial fixes…
A new open-source tool is bridging the gap between artificial intelligence and offensive security operations. GHOSTCREW is an advanced AI red team assistant that leverages Large…
It’s a tough time in the charity sector. With the rises in cost of living and unemployment, fewer people are choosing – or able –…
Researchers warn that thousands of Fortinet instances are at risk of exploitation after the company disclosed that a legacy flaw is under renewed attack. The…
Popular AI-powered integrated development environment solutions, such as Cursor, Windsurf, Google Antigravity, and Trae, recommend extensions that are non-existent in the OpenVSX registry, allowing threat…
ProfileHound emerges as a specialized post-exploitation instrument for offensive security professionals seeking to identify high-value targets within Active Directory environments. The tool addresses a critical…
This week on the Lock and Code podcast… There’s an entire surveillance network popping up across the United States that has likely already captured your…
Recommerce, pre-loved, resale, or second-hand goods – whatever synonym one would like to use – is a big focus area for retail. It has moved…
Kimwolf botnet leverages residential proxies to hijack 2M+ Android devices Pierluigi Paganini January 05, 2026 The Kimwolf botnet has infected over 2 million Android devices,…
Listen to the article 7 min This audio is auto-generated. Please let us know if you have feedback. In August, a cyberattack forced automobile manufacturing…