Items tagged with cybersecurity

The May 2026 report from Google’s Threat Intelligence Group marks a definitive shift in the cybersecurity landscape. While previous assessments categorized AI-assisted cyberattacks as experimental, current data from Mandiant and Gemini... Read more...
Discovery of the Copy Fail Linux kernel exploit sparked widespread discussion and concern around Linux kernel security earlier this month, and that was for an exploit that had mostly already been patched by the time the public was made... Read more...
Researchers at Trend Micro have identified a frightening new Linux rootkit, dubbed Quasar Linux (QLNX,) and developers should be especially concerned. Per the report (which we spotted through Bleeping Computer's coverage,) QLNX is a Linux... Read more...
Google is the latest company to generate negative headlines for its AI integration, due to its Gemini AI integration into Chrome announced back in September of last year. In the months since, the feature has rolled out to users' PCs, and... Read more...
It's not often that a major vulnerability is found in the Linux kernel, but when it does happen, it demands attention. Such is the case with "Copy Fail", which has just been found and disclosed by researchers at Xint Code. The good news is... Read more...
Ransomware attacks have grown in complexity and frequency over the past decade, but as horrible as an attack can be, malicious actors often honor the ransom and decrypt files after receiving payment. With the rise of VECT 2.0 ransomware... Read more...
The rise of AI is having an impact across every sector of the technology industry, and cybersecurity is no exception. Malicious actors have proven adept at leveraging the technology to boost their malware campaigns while lowering the... Read more...
A cyber security expert that goes by the name Nightmare-Eclipse attempted to disclose three zero day exploits to Microsoft, but the first attempt went so poorly, he elected to release it into the wild. That first exploit was dubbed... Read more...
Educational publishing giant McGraw Hill has confirmed a massive data leak, resulting in roughly 13.5 million user accounts being exposed online. The breach, which materialized earlier this month (April 2026), stemmed from a... Read more...
Stop me if you've heard this one before: a large wave of trusted extensions on the Chrome Web Store has been found to nest malware despite performing their core functions as described. If this sounds familiar to you, that's likely because... Read more...
Observing transistors as they operate has always been a challenge in computing, but per IEEE Spectrum, researchers from Australia's Adelaide University have found a way. Specifically, through the use of terahertz waves and the right... Read more...
A new malware campaign has been uncovered by the security researchers at Malwarebytes Labs, which steals sensitive and personal information from unsuspecting Windows users. It has proven to be an effective attack thanks to both how this... Read more...
A new, particularly malicious Android rootkit has been identified by the team of cybersecurity researchers at McAfee, and as the above image indicates, it has a particularly high rate of infection across the Midwestern United States... Read more...
A great benefit of cloud storage is the ability to automatically store backup data off-site, but ransomware can be a serious problem to that approach, since if it too is synced off-site, the entire cloud backup may be useless. Google... Read more...
Starting on April 24th, all GitHub Copilot interaction data including inputs, outputs, code snippets, and associated context from Copilot Free, Pro, and Pro+ users will be used to train GitHub's AI models unless those users manually opt... Read more...
According to Google, Q-Day—the point at which modern encryption becomes obsolete in the face of quantum computers capable of breaking it instantly—is approaching. Google suggests the day may arrive as soon as 2029, which makes the next... Read more...
In a politically-motivated move, the Federal Communications Commission (FCC) has updated its Covered List of restricted goods to include "all (new) consumer-grade routers produced in foreign countries", citing "unacceptable risks to the... Read more...
It’s a never-ending game of cat and mouse between attackers and software makers, with the latest salvo being fired against one of Google Chrome’s key security features. Security researchers at Gen Threat Labs have discovered that a piece... Read more...
FBI Director Kash Patel confirmed in a Senate hearing on Wednesday, "We do purchase commercially available information that's consistent with the Constitution and the laws under the Electronic Communications Privacy Act, and it has led to... Read more...
Law enforcement agencies have scored a major win against the world’s most predatory botnet operations, dismantling the infrastructure of four major networks responsible for some of the most aggressive cyberattacks in internet history. The... Read more...
The GlassWorm malware made news when it pivoted from exclusively targeting Windows users to also targeting Mac OS users in January, and in the time since, the malware campaign has spread across at least 413 code repos on npm, VSCode... Read more...
The security researchers at Kaspersky have detailed a new malware campaign targeting Android users, which aims to take over a victim’s device to abscond with user data while simultaneously putting it work mining cryptocurrencies. This new... Read more...
1 2 3 4 5 Next