Google Will Use AI to Guess People’s Ages Based on Search History
02
Aug
2025

Google Will Use AI to Guess People’s Ages Based on Search History

Last week, the United Kingdom began requiring residents to verify their ages before accessing online pornography and other adult content,…

New Undetectable Plague Malware Targeting Linux Servers for Persistent SSH Access
02
Aug
2025

New Undetectable Plague Malware Targeting Linux Servers for Persistent SSH Access

Security researchers have discovered a sophisticated Linux backdoor dubbed “Plague” that has remained undetected by all major antivirus engines despite…

Serhii Mikhalap
02
Aug
2025

Why Cybersecurity Should Be a Board-Level Priority in Every Company

Cybersecurity is no longer a technical afterthought, thanks to today’s interconnected world. It’s a boardroom imperative. As online threats become…

Why the tech industry needs to stand firm on preserving end-to-end encryption
02
Aug
2025

Why the tech industry needs to stand firm on preserving end-to-end encryption

Restricting end-to-end encryption on a single-country basis would not only be absurdly difficult to enforce, but it would also fail…

New Undectable Plague Malware Attacking Linux Servers to Gain Persistent SSH Access
02
Aug
2025

New Undectable Plague Malware Attacking Linux Servers to Gain Persistent SSH Access

A sophisticated Linux backdoor dubbed Plague has emerged as an unprecedented threat to enterprise security, evading detection across all major…

Is your phone spying on you?
02
Aug
2025

Is your phone spying on you?

Here’s what you need to know about the inner workings of modern spyware and how to stay away from apps…

ChatGPT
02
Aug
2025

Anthropic says OpenAI engineers using Claude Code ahead of GPT-5 launch

Anthropic says it has revoked OpenAI’s access to the Claude API after ChatGPT’s engineers were found using Claude’s coding tools….

11,000 Android Devices Hacked by Chinese Threats Actors to Deploy PlayPraetor Malware
02
Aug
2025

11,000 Android Devices Hacked by Chinese Threats Actors to Deploy PlayPraetor Malware

A sophisticated malware-as-a-service operation orchestrated by Chinese-speaking threat actors has successfully compromised over 11,000 Android devices worldwide through the deployment…

Akira Ransomware Exploits 0-Day Vulnerability in SonicWall Firewall Devices
02
Aug
2025

Akira Ransomware Exploits 0-Day Vulnerability in SonicWall Firewall Devices

Cybersecurity firm Arctic Wolf has identified a significant increase in ransomware attacks targeting SonicWall firewall devices in late July 2025,…

LockBit Operators Using Stealthy DLL Sideloading Technique to Load Malicious App as Legitimate One
02
Aug
2025

LockBit Operators Using Stealthy DLL Sideloading Technique to Load Malicious App as Legitimate One

LockBit ransomware operators have adopted an increasingly sophisticated approach to evade detection by leveraging DLL sideloading techniques that exploit the…

SonicWall Firewall Devices 0-day Vulnerability Actively Exploited by Akira Ransomware
02
Aug
2025

SonicWall Firewall Devices 0-day Vulnerability Actively Exploited by Akira Ransomware

A suspected zero-day vulnerability in SonicWall firewall devices that the Akira ransomware group is actively exploiting. The flaw allows attackers…

Akira Ransomware Exploits SonicWall VPNs in Likely Zero-Day Attack on Fully-Patched Devices
02
Aug
2025

Akira Ransomware Exploits SonicWall VPNs in Likely Zero-Day Attack on Fully-Patched Devices

Aug 02, 2025Ravie LakshmananVulnerability / Zero Day SonicWall SSL VPN devices have become the target of Akira ransomware attacks as…