Items tagged with cybersecurity
by
Tim Sweezy - Tue, May 12, 2026
The May 2026 report from Google’s Threat Intelligence Group marks a definitive shift in the cybersecurity landscape. While previous assessments categorized AI-assisted cyberattacks as experimental, current data from Mandiant and Gemini...
Read more...
by
Chris Harper - Fri, May 08, 2026
Discovery of the Copy Fail Linux kernel exploit sparked widespread discussion and concern around Linux kernel security earlier this month, and that was for an exploit that had mostly already been patched by the time the public was made...
Read more...
by
Chris Harper - Wed, May 06, 2026
Researchers at Trend Micro have identified a frightening new Linux rootkit, dubbed Quasar Linux (QLNX,) and developers should be especially concerned. Per the report (which we spotted through Bleeping Computer's coverage,) QLNX is a Linux...
Read more...
by
Chris Harper - Wed, May 06, 2026
Google is the latest company to generate negative headlines for its AI integration, due to its Gemini AI integration into Chrome announced back in September of last year. In the months since, the feature has rolled out to users' PCs, and...
Read more...
by
Chris Harper - Thu, Apr 30, 2026
It's not often that a major vulnerability is found in the Linux kernel, but when it does happen, it demands attention. Such is the case with "Copy Fail", which has just been found and disclosed by researchers at Xint Code. The good news is...
Read more...
by
Chris Harper - Wed, Apr 29, 2026
Ransomware attacks have grown in complexity and frequency over the past decade, but as horrible as an attack can be, malicious actors often honor the ransom and decrypt files after receiving payment. With the rise of VECT 2.0 ransomware...
Read more...
by
Alan Velasco - Wed, Apr 22, 2026
The rise of AI is having an impact across every sector of the technology industry, and cybersecurity is no exception. Malicious actors have proven adept at leveraging the technology to boost their malware campaigns while lowering the...
Read more...
by
Chris Harper - Fri, Apr 17, 2026
A cyber security expert that goes by the name Nightmare-Eclipse attempted to disclose three zero day exploits to Microsoft, but the first attempt went so poorly, he elected to release it into the wild. That first exploit was dubbed...
Read more...
by
Zak Killian - Thu, Apr 16, 2026
Educational publishing giant McGraw Hill has confirmed a massive data leak, resulting in roughly 13.5 million user accounts being exposed online. The breach, which materialized earlier this month (April 2026), stemmed from a...
Read more...
by
Chris Harper - Wed, Apr 15, 2026
Stop me if you've heard this one before: a large wave of trusted extensions on the Chrome Web Store has been found to nest malware despite performing their core functions as described. If this sounds familiar to you, that's likely because...
Read more...
by
Chris Harper - Tue, Apr 14, 2026
Observing transistors as they operate has always been a challenge in computing, but per IEEE Spectrum, researchers from Australia's Adelaide University have found a way. Specifically, through the use of terahertz waves and the right...
Read more...
by
Alan Velasco - Mon, Apr 13, 2026
A new malware campaign has been uncovered by the security researchers at Malwarebytes Labs, which steals sensitive and personal information from unsuspecting Windows users. It has proven to be an effective attack thanks to both how this...
Read more...
by
Chris Harper - Thu, Apr 02, 2026
A new, particularly malicious Android rootkit has been identified by the team of cybersecurity researchers at McAfee, and as the above image indicates, it has a particularly high rate of infection across the Midwestern United States...
Read more...
by
Chris Harper - Tue, Mar 31, 2026
A great benefit of cloud storage is the ability to automatically store backup data off-site, but ransomware can be a serious problem to that approach, since if it too is synced off-site, the entire cloud backup may be useless. Google...
Read more...
by
Chris Harper - Thu, Mar 26, 2026
Starting on April 24th, all GitHub Copilot interaction data including inputs, outputs, code snippets, and associated context from Copilot Free, Pro, and Pro+ users will be used to train GitHub's AI models unless those users manually opt...
Read more...
by
Chris Harper - Thu, Mar 26, 2026
According to Google, Q-Day—the point at which modern encryption becomes obsolete in the face of quantum computers capable of breaking it instantly—is approaching. Google suggests the day may arrive as soon as 2029, which makes the next...
Read more...
by
Chris Harper - Tue, Mar 24, 2026
In a politically-motivated move, the Federal Communications Commission (FCC) has updated its Covered List of restricted goods to include "all (new) consumer-grade routers produced in foreign countries", citing "unacceptable risks to the...
Read more...
by
Alan Velasco - Mon, Mar 23, 2026
It’s a never-ending game of cat and mouse between attackers and software makers, with the latest salvo being fired against one of Google Chrome’s key security features. Security researchers at Gen Threat Labs have discovered that a piece...
Read more...
by
Chris Harper - Fri, Mar 20, 2026
FBI Director Kash Patel confirmed in a Senate hearing on Wednesday, "We do purchase commercially available information that's consistent with the Constitution and the laws under the Electronic Communications Privacy Act, and it has led to...
Read more...
by
Aaron Leong - Fri, Mar 20, 2026
Law enforcement agencies have scored a major win against the world’s most predatory botnet operations, dismantling the infrastructure of four major networks responsible for some of the most aggressive cyberattacks in internet history. The...
Read more...
by
Chris Harper - Wed, Mar 18, 2026
The GlassWorm malware made news when it pivoted from exclusively targeting Windows users to also targeting Mac OS users in January, and in the time since, the malware campaign has spread across at least 413 code repos on npm, VSCode...
Read more...
by
Alan Velasco - Thu, Mar 12, 2026
The security researchers at Kaspersky have detailed a new malware campaign targeting Android users, which aims to take over a victim’s device to abscond with user data while simultaneously putting it work mining cryptocurrencies. This new...
Read more...