The women-only dating safety app Tea has suffered a significant cybersecurity incident, with hackers gaining unauthorized access to approximately 72,000…
Dutch intelligence agencies AIVD and MIVD, alongside Microsoft Threat Intelligence, have identified Laundry Bear also tracked as Void Blizzard as…
Carnegie Mellon University researchers have demonstrated that large language models can autonomously plan and carry out sophisticated cyberattacks without human…
It’s time for SpaceX to take strong action against scammers abusing the company’s Starlink internet service, Sen. Maggie Hassan said…
Singapore’s critical infrastructure is under siege from UNC3886, a sophisticated China-linked advanced persistent threat (APT) group. As of July 2025,…
Malware-as-a-service (MaaS) platforms like PhantomOS and Nebula are democratizing Android device attacks because they provide pre-built, subscription-based malware kits for…
Developers often adopt generative AI (GenAI) because it helps them to code faster, yet the tooling has potential to expose…
The FBI released a trove of research on The Com last week, warning that the sprawling cybercriminal network of minors…
APIs: Still Easy Targets in 2025 APIs are the backbone of modern applications – and one of the most exposed…
Russia’s Aeroflot, one of the world’s oldest airlines, has been left scrambling after pro-Ukraine hackers claimed to have “completely destroyed”…
Cybersecurity researchers have successfully deployed artificial intelligence-powered honeypots to trick cybercriminals into revealing their attack strategies, demonstrating a promising new…
Critical WordPress Post SMTP plugin flaw exposes 200K+ sites to full takeover Pierluigi Paganini July 28, 2025 Critical vulnerability in…











