The Hidden Danger: Secrets Sprawl Beyond the Codebase
11
Aug
2025

The Hidden Danger: Secrets Sprawl Beyond the Codebase

GitGuardian’s 2025 State of Secrets Sprawl Report reveals an alarming expansion of credential exposure across enterprise environments, with collaboration tools…

UAC-0099 Tactics, Techniques, Procedures and Attack Methods Revealed
11
Aug
2025

UAC-0099 Tactics, Techniques, Procedures and Attack Methods Revealed

UAC-0099, a persistent threat actor active since at least 2022, has conducted sophisticated cyber-espionage operations against Ukrainian government, military, and…

Why Intel’s woes shows the fragility of the European Chips Act
11
Aug
2025

Why Intel’s woes shows the fragility of the European Chips Act

Intel has found itself on the defensive following a social media post from US president Donald Trump, who last week…

Hackers Poison Google Paid Ads With Fake Tesla Websites to Deliver Malware
11
Aug
2025

Hackers Poison Google Paid Ads With Fake Tesla Websites to Deliver Malware

In recent weeks, a flurry of sponsored listings promising preorders for Tesla’s anticipated Optimus robots began appearing at the top…

Meta’s New Feature Turns Instagram into a Real-Time Location Broadcaster
11
Aug
2025

Meta’s New Feature Turns Instagram into a Real-Time Location Broadcaster

Meta has introduced a transformative update to Instagram, evolving the platform from a simple photo-sharing service into an always-on real-time…

car dealership
11
Aug
2025

Online portal exposed car and personal data, allowed anyone to remotely unlock cars

A carmaker’s online dealership portal has been found leaking the private information and vehicle data of its customers. This also…

Podcast: Key hurdles in AI from proof of concept to production
11
Aug
2025

Podcast: Key hurdles in AI from proof of concept to production

One of the biggest hurdles – and key points that failure can occur – in artificial intelligence (AI) in the…

Hackers Weaponized Linux Webcams as Attack Tools to Inject Keystrokes and Launch Attacks
11
Aug
2025

Hackers Weaponized Linux Webcams as Attack Tools to Inject Keystrokes and Launch Attacks

A critical vulnerability was uncovered that transforms ordinary Linux-powered webcams into weaponized BadUSB attack tools, enabling remote hackers to inject…

Linux Webcams Weaponized to Inject Keystrokes and Execute Attacks
11
Aug
2025

Linux Webcams Weaponized to Inject Keystrokes and Execute Attacks

Security researchers have uncovered a concerning vulnerability that transforms everyday USB webcams into covert attack tools capable of injecting malicious…

Hackers Leak 9GB of Data from Alleged North Korean Hacker’s Computer
11
Aug
2025

Hackers Leak 9GB of Data from Alleged North Korean Hacker’s Computer

Hackers release 9GB of stolen files from the computer of an alleged North Korean hacker, revealing tools, logs, sensitive data…

Win-DDoS: Attackers can turn public domain controllers into DDoS agents
11
Aug
2025

Win-DDoS: Attackers can turn public domain controllers into DDoS agents

SafeBreach researchers have released details on several vulnerabilities that could be exploited by attackers to crash Windows Active Directory domain…

ClickFix Malware Attacks macOS Users to Steal Login Credentials
11
Aug
2025

ClickFix Malware Attacks macOS Users to Steal Login Credentials

In recent months, security researchers have observed a novel phishing campaign targeting macOS users under the guise of a CAPTCHA…