Pavel Durov announced that over the past 20 days, Telegram has received hundreds of reports from users about cases of extortion and doxxing. Based on these complaints, the platform initiated a large-scale purge of...
Automation of IT infrastructure management through artificial intelligence, as revealed in a recent study by RSAC Labs and George Mason University, may carry substantial risks. The researchers found that AIOps solutions—systems leveraging models akin...
No AI product in history has stirred such a tidal wave of anticipation as OpenAI’s long-awaited GPT-5. Yet, following its high-profile launch last week, the model swiftly found itself under fire—a troubling omen for...
Ahead of IFA 2025, Samsung has officially unveiled in South Korea the world’s first large-format display featuring Micro RGB technology, boasting an impressive 115-inch screen. This groundbreaking innovation incorporates red, green, and blue Micro...
Since its emergence in the spring of 2024, the ransomware-as-a-service (RaaS) group Embargo has rapidly secured a prominent position in the cybercriminal landscape. According to TRM Labs, wallets linked to the operation may have...
A hidden system prompt for GPT-5 has surfaced online, published on GitHub. This set of internal rules defines what ChatGPT may and may not do, which types of data it can retain, and which...
A wave of SMS fraud sweeping across the United States and beyond has entered a new and more insidious phase. Behind seemingly mundane yet convincing messages about unpaid fines or failed deliveries lies a...
The Debian GNU/Hurd development team has announced the release of version 2025. While not an official release of the core Debian distribution, it marks the official publication of the GNU/Hurd port, synchronized with the...
Security experts at SafeBreach have disclosed the details of a vulnerability in the Windows Remote Procedure Call (RPC) protocol, patched by Microsoft in the July 2025 security update. Tracked as CVE-2025-49760 with a CVSS...
Although former design chief Jony Ive has long since departed from Apple, his visionary “single block of glass” iPhone concept still appears to guide the company’s long-term design philosophy. Recently, a newly filed Apple...
A vulnerability was discovered in the online access system for auto dealers of one of the world’s largest car manufacturers—uncovered simply by examining the page’s code. Security researcher Eitan Zwer of Harness reported that...
Researchers at Forcepoint X-Labs have identified a new malware campaign targeting macOS users. The attack employs an enhanced ClickFix technique—combining phishing with social engineering—to steal data from cryptocurrency wallets, browser accounts, and confidential files....
At DEF CON 33, researchers from SafeBreach unveiled a new attack technique dubbed Win-DDoS, capable of transforming thousands of publicly accessible domain controllers (DCs) worldwide into a powerful botnet for large-scale DDoS attacks. The...
Researchers at Eclypsium have uncovered critical vulnerabilities in the Lenovo 510 FHD and Lenovo Performance FHD webcams that allow them to be transformed into BadUSB-style attack devices. The issue, dubbed BadCam, was presented at...
Linus Torvalds delivered a sharp rebuke to the initial batch of RISC-V patches proposed for inclusion in Linux 6.17, citing both their untimely submission and the presence of what he called “garbage” changes unrelated...
After more than two years of development, the Debian Project has unveiled a new stable release of its operating system—Debian 13, codenamed trixie. It will receive updates and security fixes for five years, thanks...