Items tagged with security

A sophisticated iPhone hacking toolkit, suspected to have originated within U.S. government-linked development circles, has surfaced in the wild as a weapon used by both foreign intelligence services and opportunistic cybercriminals. It's... Read more...
Even in the world of cyber-criminals, there are some targets that simply won't earn you any admiration. One such case is a cyber attack involving the University of Hawaii's Cancer Center Epidemiology Division, with the data targeted... Read more...
Traditional cryptographic signatures that underpin HTTPS can be broken by a sufficiently powerful quantum computer using algorithms like Shor's, threatening the trust model of secure connections. To help protect against this threat, Google... Read more...
AirSnitch is a newly-revealed attack on Wi-Fi networks that work across all major router brands and firmwares, including DD-WRT and OpenWrt. In an alarming turn for cybersecurity, researchers revealed a form of Wi-Fi attack that can... Read more...
Apple's iPhone and iPad devices running iOS and iPadOS 26, respectively, have become the first consumer-grade mobile devices officially approved to handle classified NATO information. This certification, announced by Apple following an... Read more...
Modern vehicle computer systems have become vectors for security and privacy hacking. However, who would've thought that the humble and not-very-high-tech tire pressure monitoring system (TPMS) would be identified as vulnerability... Read more...
The team at Discord introduced some discord to our newsroom today. First, a company representative sent us a statement requiring us to update a previous article on its "Teen-By-Default" policy, and then it turned around and dropped a new... Read more...
Update 2/24: This article was originally titled "Discord Drops Persona After Users Blast UK Age Checks And Data Practices". Per a statement we received from Discord after publishing, we've altered the title and acknowledge that its trial... Read more...
iOS users may already be aware of the commercial spyware dubbed Predator, but may not know exactly what it's capable. Fortunately, malware researchers Nir Avraham and Hu Ke have published a detailed write-up on how the Predator spyware... Read more...
PayPal just disclosed a data breach that exposed sensitive user information, including social security numbers. From July 1st, 2025 to December 12th, 2025, a software glitch in PayPal Working Capital (PPWC) loan applications allowed... Read more...
Google is flexing its AI muscle in an effort to make its Android ecosystem safer and more secure. Malicious actors are constantly evolving the ways attacks are deployed, including leveraging AI themselves. Google says it was able to use... Read more...
Attention all Chrome users, Google is rolling out an emergency patch to address a high-severity zero-day security flaw in the world's most popular browser (by market share), and it's not one you want to ignore. That is because Google... Read more...
During the Super Bowl, Amazon's Ring advertised a feature called Search Party in collaboration with Flock Safety, which was billed as an AI-accelerated way to make it easy for Ring customers to "help families find lost dogs" and help users... Read more...
Microsoft is addressing nearly 60 CVEs with its upcoming "Patch Tuesday" update for Windows 11, six of which are actively-exploited zero-day vulnerabilities. Per KrebsOnSecurity, the most sever CVEs are CVE-2026-21510, CVE-2026-21513... Read more...
Discord has committed to a global rollout of "teen-by-default" settings. That means users who change some specific settings or attempt to access age-restricted content on the platform, may be prompted to verify their age. Discord age... Read more...
Researchers at the security firm iVerify have discovered a new piece of malware dubbed ZeroDayRAT, which can be used to compromise both Android and iOS devices. The company describes it as a “complete mobile compromise toolkit” typically... Read more...
Microsoft hasn't had an easy time with Windows 11 updates as of late, but in an unexpected move, the company just offered a very thoughtful, uncontroversial addition to Windows 11—the popular Sysmon (System Monitor) utility, which launched... Read more...
As terrifying proof of how much artificial intelligence can compress the cyberattack lifecycle, researchers have documented a real-world AWS cloud intrusion that went from a simple credential leak to full administrative control in under 10... Read more...
Microsoft Office is victim to a critical zero-day exploit, and Russian hacker groups are already weaponizing it in destabilizing efforts toward the Ukrainian government. While Westerners and most other readers likely have less to worry... Read more...
Notepad++ reported that its built-in auto-update feature had been hijacked by Chinese state-sponsored hackers from June to September of 2025, and the credentials gathered by the bas actors enabled further exploits until December 2nd, 2025... Read more...
Google has a deeply-vested interest in cybersecurity and unparalleled resources to take down bad actors. The latest target on Google's kill list was a malicious proxy network called IPIDEA, and through coordinated efforts inside and... Read more...
An AI-powered toy company exposed more than 50,000 private chat logs between children and its products after leaving a web console almost completely unsecured. According to WIRED, anyone with a Gmail account could access transcripts of... Read more...
1 2 3 4 5 Next