Google has found itself at the center of a major legal battle that culminated in a California jury ordering the tech giant to pay over $314 million to Android smartphone users in the state....
Anthropic has encountered a critical vulnerability in one of its AI-related projects. The flaw, identified as CVE-2025-49596, affects the Model Context Protocol (MCP) Inspector tool and has been assigned a CVSS severity score of...
A newly discovered technique in Windows allows malicious scripts to be executed without triggering any user warnings. This method, known as FileFix, has been refined to exploit a vulnerability in how browsers handle saved...
Let’s Encrypt has officially begun issuing certificates for IP addresses. The inaugural certificate of this kind was issued on July 1, 2025—nearly a decade after the service’s initial launch. Although the new feature was...
Google has once again drawn the attention of cybersecurity experts following its implementation of a new user data protection mechanism in the Chrome browser—AppBound Cookie Encryption. Although the initiative reflects an ambitious stride toward...
According to a Bloomberg report, SoftBank’s previously announced $6.5 billion acquisition of Ampere Computing is now under a “Second Request” investigation by the U.S. Federal Trade Commission (FTC), signaling that the deal could be...
The Damn Vulnerable Model Context Protocol (DVMCP) is an educational project designed to demonstrate security vulnerabilities in MCP implementations. It contains 10 challenges of increasing difficulty that showcase different types of vulnerabilities and attack...
Cybercriminals have launched a new wave of attacks targeting WordPress websites—so meticulously concealed that the campaign was only recently uncovered. Security experts at Sucuri have discovered that compromised websites are being used as silent...
Scientists at the Leibniz Institute of Photonic Technology in Jena, in collaboration with international colleagues, have developed two innovative methods that may bring quantum communication closer to real-world deployment beyond laboratory confines. One method...
The U.S. Department of Justice has announced the uncovering of a vast scheme in which fraudulent IT specialists from North Korea secured employment with American companies by posing as citizens of other countries. According...
The International Criminal Court (ICC) in The Hague has once again come under the crosshairs of cyber attackers. The judicial body reported that it had been the target of a deliberate and coordinated cyberattack....
Microsoft has announced its intention to discontinue password support within the Authenticator app starting August 1, 2025. This move forms part of the company’s broader global initiative to shift away from traditional login methods...
Google has released security updates for its Chrome browser to address a critical vulnerability for which an active exploit is already in circulation. The issue, tracked as CVE-2025-6554, is classified as a “Type Confusion”...
Proton has officially joined the legal battle against Apple, accusing the tech giant of violating antitrust laws and undermining the interests of developers, users, and data privacy. In its complaint filed with the U.S....
The Government of Canada has officially ordered the cessation of operations of Hikvision Canada Inc. within its territory, citing concerns over national security. The announcement followed the conclusion of a multi-phase review conducted under...
U.S. cyber divisions, including the FBI and NSA, have issued an urgent advisory warning of potential cyberattacks targeting the nation’s critical infrastructure by hacker groups affiliated with Iran. While experts note that there is...