GreedyBear Scam: 150 Fake Crypto Wallet Extensions Found on Firefox Marketplace
08
Aug
2025

150 Fake Crypto Wallet Extensions Found on Firefox Marketplace

A sophisticated and large-scale cybercrime campaign, named GreedyBear, has been exposed for stealing at least a million dollars from cryptocurrency…

What Attackers Are Doing With Them
08
Aug
2025

What Attackers Are Doing With Them

When an organization’s credentials are leaked, the immediate consequences are rarely visible—but the long-term impact is far-reaching. Far from the…

Microsoft 365
08
Aug
2025

Microsoft 365 apps to soon block file access via FPRPC by default

Microsoft has announced that the Microsoft 365 apps for Windows will start blocking access to files via the insecure FPRPC…

Columbia University Data Breach - Hackers Stolen 870,000 Individuals Personal and Financial Data
08
Aug
2025

Columbia University Data Breach – Hackers Stolen 870,000 Individuals Personal and Financial Data

Columbia University has disclosed a major cybersecurity incident where an unauthorized third party accessed and extracted a significant volume of…

ChatGPT-5 Launches – Discover What’s New in the Next-Gen AI Agent
08
Aug
2025

ChatGPT-5 Launches – Discover What’s New in the Next-Gen AI Agent

OpenAI has officially launched ChatGPT-5, marking a significant leap forward in artificial intelligence technology with a revolutionary unified system that…

UK government to address balancing energy sustainability with AI growth demands
08
Aug
2025

The UK government’s AI Growth Zones strategy: Everything you need to know

The government is on a mission to make the UK an artificial intelligence (AI) superpower, by accelerating the adoption of…

Microsoft Lens
08
Aug
2025

Microsoft will kill the Lens PDF scanner app for iOS, Android

Microsoft announced that it will phase out the Microsoft Lens PDF scanner app for Android and iOS devices starting in September….

Windows User Account Control Bypassed Using Character Editor to Escalate Privileges
08
Aug
2025

Windows User Account Control Bypassed Using Character Editor to Escalate Privileges

A sophisticated new technique that exploits the Windows Private Character Editor to bypass User Account Control (UAC) and achieve privilege…

CISA Issues 10 ICS Advisories Detailing Vulnerabilities and Exploits
08
Aug
2025

CISA Issues 10 ICS Advisories Detailing Vulnerabilities and Exploits

The Cybersecurity and Infrastructure Security Agency (CISA) has released ten industrial control systems (ICS) advisories on August 7, 2025, highlighting…

OpenAI closes gap to artificial general intelligence with GPT-5
08
Aug
2025

OpenAI closes gap to artificial general intelligence with GPT-5

OpenAI has updated its large language model (LLM) in ChatGPT to GPT-5, which it says takes a significant step towards…

Exploiting ECS Protocol on EC2 to Exfiltrate Cross-Task IAM and Execution Role Credentials
08
Aug
2025

Exploiting ECS Protocol on EC2 to Exfiltrate Cross-Task IAM and Execution Role Credentials

A sophisticated technique dubbed “ECScape” that allows malicious containers running on Amazon Elastic Container Service (ECS) to steal AWS credentials…

Amazon ECS Internal Protocol Exploited to Steal AWS Credentials from Other Tasks
08
Aug
2025

Amazon ECS Internal Protocol Exploited to Steal AWS Credentials from Other Tasks

Security researchers have disclosed a critical vulnerability in Amazon Elastic Container Service (ECS) that allows malicious containers to steal AWS…