Gemini logo
08
Jul
2025

No thanks: Google lets its Gemini AI access your apps, including messages

If you’re an Android user, you’ll need to take action if you don’t want Google’s Gemini AI to have access…

What’s the latest with retail mobile apps?
08
Jul
2025

What’s the latest with retail mobile apps?

There’s an app for that. No, it’s not 2009 all over again when Apple used that slogan to promote its…

Hackers Use ClickFix Technique to Deploy NetSupport RAT via Compromised WordPress Sites
08
Jul
2025

Hackers Use ClickFix Technique to Deploy NetSupport RAT via Compromised WordPress Sites

Security researchers have uncovered a sophisticated cyberattack campaign leveraging compromised WordPress websites to distribute the NetSupport Remote Access Trojan through…

The Global Cybercrime Industry As A Country
08
Jul
2025

5 Lessons Learned From The World’s Biggest Cyberattacks

Cybercrime is accelerating at an alarming rate, with Cybersecurity Ventures expecting around $10.5 trillion USD to be lost to the global…

Investment Fraud Globally
08
Jul
2025

Over 17,000 Fake News Websites Caught Fueling Investment Fraud Globally

A newly released report by cybersecurity firm CTM360 reveals a large-scale scam operation utilizing fake news websites—known as Baiting News…

Interview: Vivek Bharadwaj, CIO, Happy Socks
08
Jul
2025

Interview: Vivek Bharadwaj, CIO, Happy Socks

Vivek Bharadwaj, CIO at clothing manufacturer Happy Socks, is an executive with an expansive portfolio. In addition to leading enterprise-wide…

Weaponized Chrome Extension Affects 1.7 Million Users Despite Google's Verified Badges
08
Jul
2025

Weaponized Chrome Extension Affects 1.7 Million Users Despite Google’s Verified Badges

A sophisticated malware campaign has infected over 1.7 million Chrome users through eleven seemingly legitimate browser extensions, all of which…

Infostealers-as-a-Service Push Identity Hacks to Record Highs
08
Jul
2025

Infostealers-as-a-Service Push Identity Hacks to Record Highs

According to cybersecurity researchers at eSentire, infostealer malware and advanced phishing toolkits are behind a massive 156% jump in cyberattacks…

RondoDox Botnet Exploits Flaws in TBK DVRs and Four-Faith Routers to Launch DDoS Attacks
08
Jul
2025

RondoDox Botnet Exploits Flaws in TBK DVRs and Four-Faith Routers to Launch DDoS Attacks

Cybersecurity researchers are calling attention to a malware campaign that’s targeting security flaws in TBK digital video recorders (DVRs) and…

Google slams claims it’s ‘misleading’ the public with its GHG emissions data
08
Jul
2025

Google slams claims it’s ‘misleading’ the public with its GHG emissions data

Google has hit back at a report picking holes in its carbon emission reduction claims, saying the analysis carried out by…

PoC Exploits for CitrixBleed2 Flaw Released – Attackers Can Exfiltrate 127 Bytes Per Request
08
Jul
2025

PoC Exploits for CitrixBleed2 Flaw Released – Attackers Can Exfiltrate 127 Bytes Per Request

Security researchers have released proof-of-concept exploits for a critical vulnerability dubbed “CitrixBleed2” affecting Citrix NetScaler ADC and Gateway products.  The…

CISA Alerts on Active Exploitation of PHPMailer Command Injection Flaw
08
Jul
2025

CISA Alerts on Active Exploitation of PHPMailer Command Injection Flaw

 The Cybersecurity and Infrastructure Security Agency (CISA) has issued a critical alert regarding the active exploitation of a long-standing vulnerability…