Women’s Dating App Tea Exposes Selfie Images of 13,000 Users
28
Jul
2025

Women’s Dating App Tea Exposes Selfie Images of 13,000 Users

The women-only dating safety app Tea has suffered a significant cybersecurity incident, with hackers gaining unauthorized access to approximately 72,000…

Inside Laundry Bear: Unveiling Infrastructure, Tactics, and Procedures
28
Jul
2025

Inside Laundry Bear: Unveiling Infrastructure, Tactics, and Procedures

Dutch intelligence agencies AIVD and MIVD, alongside Microsoft Threat Intelligence, have identified Laundry Bear also tracked as Void Blizzard as…

Research shows LLMs can conduct sophisticated attacks without humans
28
Jul
2025

Research shows LLMs can conduct sophisticated attacks without humans

Carnegie Mellon University researchers have demonstrated that large language models can autonomously plan and carry out sophisticated cyberattacks without human…

Sen. Hassan wants to hear from SpaceX about scammers abusing Starlink
28
Jul
2025

Sen. Hassan wants to hear from SpaceX about scammers abusing Starlink

It’s time for SpaceX to take strong action against scammers abusing the company’s Starlink internet service, Sen. Maggie Hassan said…

UNC3886 Hackers Exploiting 0-Days in VMware vCenter/ESXi, Fortinet FortiOS, and Juniper Junos OS
28
Jul
2025

UNC3886 Hackers Exploiting 0-Days in VMware vCenter/ESXi, Fortinet FortiOS, and Juniper Junos OS

Singapore’s critical infrastructure is under siege from UNC3886, a sophisticated China-linked advanced persistent threat (APT) group. As of July 2025,…

Android Malware-as-a-Service Gets Cheaper, Packing 2FA Interception
28
Jul
2025

Android Malware-as-a-Service Gets Cheaper, Packing 2FA Interception

Malware-as-a-service (MaaS) platforms like PhantomOS and Nebula are democratizing Android device attacks because they provide pre-built, subscription-based malware kits for…

Coding with GenAI: How businesses can manage the process
28
Jul
2025

Coding with GenAI: How businesses can manage the process

Developers often adopt generative AI (GenAI) because it helps them to code faster, yet the tooling has potential to expose…

Matt Kapko
28
Jul
2025

FBI alerts tie together threats of cybercrime, physical violence from The Com

The FBI released a trove of research on The Com last week, warning that the sprawling cybercriminal network of minors…

Autoswagger header
28
Jul
2025

Free Tool Autoswagger Finds The API Flaws Attackers Hope You Miss

APIs: Still Easy Targets in 2025 APIs are the backbone of modern applications – and one of the most exposed…

Hackers Allegedly Destroyed Aeroflot Airlines' IT Infrastructure in Year-Long Attack
28
Jul
2025

Hackers Allegedly Destroyed Aeroflot Airlines’ IT Infrastructure in Year-Long Attack

Russia’s Aeroflot, one of the world’s oldest airlines, has been left scrambling after pro-Ukraine hackers claimed to have “completely destroyed”…

LLM Honeypots Deceive Hackers into Exposing Attack Methods
28
Jul
2025

LLM Honeypots Deceive Hackers into Exposing Attack Methods

Cybersecurity researchers have successfully deployed artificial intelligence-powered honeypots to trick cybercriminals into revealing their attack strategies, demonstrating a promising new…

Critical WordPress Post SMTP plugin flaw exposes 200K+ sites to full takeover
28
Jul
2025

Critical WordPress Post SMTP plugin flaw exposes 200K+ sites to full takeover

Critical WordPress Post SMTP plugin flaw exposes 200K+ sites to full takeover Pierluigi Paganini July 28, 2025 Critical vulnerability in…