Items tagged with cybersecurity
by
Alan Velasco - Wed, Apr 22, 2026
The rise of AI is having an impact across every sector of the technology industry, and cybersecurity is no exception. Malicious actors have proven adept at leveraging the technology to boost their malware campaigns while lowering the...
Read more...
by
Chris Harper - Fri, Apr 17, 2026
A cyber security expert that goes by the name Nightmare-Eclipse attempted to disclose three zero day exploits to Microsoft, but the first attempt went so poorly, he elected to release it into the wild. That first exploit was dubbed...
Read more...
by
Zak Killian - Thu, Apr 16, 2026
Educational publishing giant McGraw Hill has confirmed a massive data leak, resulting in roughly 13.5 million user accounts being exposed online. The breach, which materialized earlier this month (April 2026), stemmed from a...
Read more...
by
Chris Harper - Wed, Apr 15, 2026
Stop me if you've heard this one before: a large wave of trusted extensions on the Chrome Web Store has been found to nest malware despite performing their core functions as described. If this sounds familiar to you, that's likely because...
Read more...
by
Chris Harper - Tue, Apr 14, 2026
Observing transistors as they operate has always been a challenge in computing, but per IEEE Spectrum, researchers from Australia's Adelaide University have found a way. Specifically, through the use of terahertz waves and the right...
Read more...
by
Alan Velasco - Mon, Apr 13, 2026
A new malware campaign has been uncovered by the security researchers at Malwarebytes Labs, which steals sensitive and personal information from unsuspecting Windows users. It has proven to be an effective attack thanks to both how this...
Read more...
by
Chris Harper - Thu, Apr 02, 2026
A new, particularly malicious Android rootkit has been identified by the team of cybersecurity researchers at McAfee, and as the above image indicates, it has a particularly high rate of infection across the Midwestern United States...
Read more...
by
Chris Harper - Tue, Mar 31, 2026
A great benefit of cloud storage is the ability to automatically store backup data off-site, but ransomware can be a serious problem to that approach, since if it too is synced off-site, the entire cloud backup may be useless. Google...
Read more...
by
Chris Harper - Thu, Mar 26, 2026
Starting on April 24th, all GitHub Copilot interaction data including inputs, outputs, code snippets, and associated context from Copilot Free, Pro, and Pro+ users will be used to train GitHub's AI models unless those users manually opt...
Read more...
by
Chris Harper - Thu, Mar 26, 2026
According to Google, Q-Day—the point at which modern encryption becomes obsolete in the face of quantum computers capable of breaking it instantly—is approaching. Google suggests the day may arrive as soon as 2029, which makes the next...
Read more...
by
Chris Harper - Tue, Mar 24, 2026
In a politically-motivated move, the Federal Communications Commission (FCC) has updated its Covered List of restricted goods to include "all (new) consumer-grade routers produced in foreign countries", citing "unacceptable risks to the...
Read more...
by
Alan Velasco - Mon, Mar 23, 2026
It’s a never-ending game of cat and mouse between attackers and software makers, with the latest salvo being fired against one of Google Chrome’s key security features. Security researchers at Gen Threat Labs have discovered that a piece...
Read more...
by
Chris Harper - Fri, Mar 20, 2026
FBI Director Kash Patel confirmed in a Senate hearing on Wednesday, "We do purchase commercially available information that's consistent with the Constitution and the laws under the Electronic Communications Privacy Act, and it has led to...
Read more...
by
Aaron Leong - Fri, Mar 20, 2026
Law enforcement agencies have scored a major win against the world’s most predatory botnet operations, dismantling the infrastructure of four major networks responsible for some of the most aggressive cyberattacks in internet history. The...
Read more...
by
Chris Harper - Wed, Mar 18, 2026
The GlassWorm malware made news when it pivoted from exclusively targeting Windows users to also targeting Mac OS users in January, and in the time since, the malware campaign has spread across at least 413 code repos on npm, VSCode...
Read more...
by
Alan Velasco - Thu, Mar 12, 2026
The security researchers at Kaspersky have detailed a new malware campaign targeting Android users, which aims to take over a victim’s device to abscond with user data while simultaneously putting it work mining cryptocurrencies. This new...
Read more...
by
Chris Harper - Thu, Mar 05, 2026
LastPass is informing users of an active phishing campaign that started at the beginning of this month, which spoofs official LastPass emails and directs users to a false login page. While directing to a false login page is a common...
Read more...
by
Chris Harper - Tue, Mar 03, 2026
Even in the world of cyber-criminals, there are some targets that simply won't earn you any admiration. One such case is a cyber attack involving the University of Hawaii's Cancer Center Epidemiology Division, with the data targeted...
Read more...
by
Chris Harper - Fri, Feb 27, 2026
AirSnitch is a newly-revealed attack on Wi-Fi networks that work across all major router brands and firmwares, including DD-WRT and OpenWrt. In an alarming turn for cybersecurity, researchers revealed a form of Wi-Fi attack that can...
Read more...
by
Chris Harper - Tue, Feb 24, 2026
The team at Discord introduced some discord to our newsroom today. First, a company representative sent us a statement requiring us to update a previous article on its "Teen-By-Default" policy, and then it turned around and dropped a new...
Read more...
by
Chris Harper - Tue, Feb 24, 2026
Update 2/24: This article was originally titled "Discord Drops Persona After Users Blast UK Age Checks And Data Practices". Per a statement we received from Discord after publishing, we've altered the title and acknowledge that its trial...
Read more...
by
Chris Harper - Mon, Feb 23, 2026
iOS users may already be aware of the commercial spyware dubbed Predator, but may not know exactly what it's capable. Fortunately, malware researchers Nir Avraham and Hu Ke have published a detailed write-up on how the Predator spyware...
Read more...