Activision has disabled the Microsoft Store version of Call of Duty: WWII after hackers began exploiting a critical vulnerability that enabled remote access to players’ computers. The affected users were those who installed the...
A Russian blockchain developer has fallen victim to a targeted attack executed through a counterfeit extension within the Cursor AI environment, resulting in the theft of approximately $500,000 worth of cryptocurrency. The incident was...
AMD has disclosed the discovery of a new class of processor vulnerabilities, dubbed Transient Scheduler Attacks (TSA). These attacks exploit speculative side channels arising from specific microarchitectural conditions, potentially leading to the leakage of...
OpenAI is reportedly preparing to launch its own artificial intelligence-powered web browser in the coming weeks, according to three sources familiar with the matter cited by Reuters. This new browser has the potential to...
The discovery of a new vulnerability, aptly named Opossum, has cast a shadow over the reliability of secure communications relying on the Transport Layer Security (TLS) protocol. This exploit enables malicious actors to inject...
The stable release of Suricata 8.0 has officially been unveiled—a powerful open-source intrusion detection and network traffic analysis system developed by the OISF foundation. This marks the first major update in two years since...
ChatGPT has once again proven susceptible to unconventional manipulation—this time, the model divulged valid Windows product keys, including one registered to the major financial institution Wells Fargo. The vulnerability was exposed through a peculiar...
Experts at Palo Alto Networks Unit 42 have uncovered a new malicious campaign orchestrated by the threat actor group known as Gold Melody. This group specializes in gaining unauthorized access to corporate systems and...
On the morning of July 9, the decentralized exchange GMX fell victim to a major cyber heist. An unidentified attacker siphoned off over $40 million worth of cryptocurrency from the platform. According to GMX...
Google has introduced a new security configuration on Android, tailored for users vulnerable to targeted cyberattacks. Known as Advanced Protection, this suite of features—once exclusive to individual Google Accounts—is now available at the device...
Microsoft is preparing a significant update for users of its Authenticator app on iOS devices. Beginning in September, a new backup system will roll out, eliminating the need to sign in with a personal...
Microsoft has introduced a long-anticipated feature in Windows 11 that allows administrators to remove preinstalled Microsoft Store applications via official Group Policy. The new functionality, titled Remove Default Microsoft Store Packages, is already available...
A researcher at Positive Technologies has uncovered a critical vulnerability in the implementation of the NTFS file system, which enables a local attacker to escalate privileges to SYSTEM by leveraging a specially crafted virtual...
An attack on the Visual Studio Code extension known as Ethcode has compromised the security of more than 6,000 developers worldwide. The incident stemmed from the insertion of malicious code into this widely used...
Microsoft has just released Windows 11 Beta Build 22631.5696 (KB5062663) to address several known system issues. These fixes are expected to arrive later this month as part of an optional update for the stable...
GPOHound is a tool for dumping and analysing Group Policy Objects (GPOs) extracted from the SYSVOL share. It provides a structured, formalized format to help uncover misconfigurations, insecure settings, and privilege escalation paths in...