Octopii Octopii is an open-source AI-powered Personal Identifiable Information (PII) scanner that can look for image assets such as Government IDs, passports, photos, and signatures in a directory. Working Octopii uses Tesseract’s Optical Character...
Microsoft has unveiled an experimental feature known as Copilot Mode—a bold new function within the Edge browser that elevates artificial intelligence from a mere assistant to a true collaborator in the user’s web experience....
The authorities of Minnesota have enacted unprecedented measures following a devastating cyberattack that crippled the digital infrastructure of Saint Paul—the state’s capital and its second-largest city. Amid widespread disruptions triggered by an unidentified group...
YouTube has begun rolling out a new system to determine users’ ages using machine learning algorithms. According to the company, the technology is already being deployed in the United States and is intended to...
Amid the continued proliferation of Android-targeting malware, researchers at Cyble Research and Intelligence Labs (CRIL) have identified a sophisticated new threat dubbed RedHook. First observed in January 2025, this banking Trojan exhibits a particularly...
ArmouryLoader has once again captured the attention of cybersecurity experts, emerging as one of the most technically sophisticated malware loaders in recent memory. Its architecture reflects a mature approach to evading defenses, employing stealthy...
Amid a surge in malicious campaigns exploiting legitimate communication channels to evade traditional security measures, a new tool has drawn the attention of cybersecurity professionals—Raven Stealer. Emerging in July 2025, this information-stealing program has...
Evilent Coerce A practical NTLM relay attack using the MS-EVEN RPC protocol and antivirus-assisted coercion. Evilent is a PoC tool that triggers the ElfrOpenBELW procedure in the MS-EVEN RPC interface (used for Windows Event...
Cybersecurity experts have identified more than a dozen critical vulnerabilities within the Niagara Framework—a platform developed by Tridium, a subsidiary of Honeywell. This technology is extensively deployed in the automation and management of smart...
A critical vulnerability has been discovered in Google’s newly released command-line interface tool, Gemini CLI, which could allow attackers to covertly execute malicious commands and exfiltrate data from developers’ machines—provided certain commands are permitted...
In mid-July, cybersecurity experts at Kaspersky Lab reported a widespread campaign targeting on-premises Microsoft SharePoint servers across the globe. The exploit chain, dubbed ToolShell, enables attackers to gain full control over vulnerable systems by...
New provisions of the United Kingdom’s Online Safety Act have come into force, mandating stringent age verification protocols for accessing content deemed potentially harmful. This move has triggered a widespread backlash, with users turning...
Following the release of GNU Binutils 2.45, a new version of the standard C library for Linux and other systems—GNU C Library 2.42—has been unveiled today. glibc 2.42 continues its integration of ISO C23...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent alert regarding the active exploitation of a critical vulnerability in the widely used print management software, PaperCut NG and MF. The flaw,...
The saga surrounding the Tea app—marketed as a safe haven for women—has now escalated into a second major data breach within a week, and this time the implications are far more severe. An independent...
Sandman Sandman is a backdoor that is meant to work on hardened networks during red team engagements. Sandman works as a stager and leverages NTP (a protocol to sync time & date) to get...