In 2023, Nvidia unveiled a groundbreaking superchip architecture that unites CPU and GPU through the high-speed NVLink bus. While it delivers far superior bandwidth compared to PCIe, for years its use was confined to...
Generative AI is now assisting in selecting patches for backporting into the stable branches of Linux, including long-term support (LTS) releases. Sasha Levin, the LTS maintainer, recently advanced updates to kernel documentation regarding the...
Congressman David Schweikert (Republican, Arizona, District AZ-01) has introduced the Cybercrime Marque and Reprisal Authorization Act of 2025 (H.R. 4988) in the House of Representatives. The bill, registered on August 15, 2025, has been...
Sangoma has issued an urgent alert regarding an actively exploited zero-day vulnerability in FreePBX installations where the Administrator Control Panel (ACP) is exposed to the internet. FreePBX, an open-source IP-PBX built on Asterisk, is...
According to a report by Microsoft Threat Intelligence, the group Storm-0501 has shifted its focus from traditional on-premises ransomware campaigns to tactics centered on cloud services. Whereas in the past attackers deployed encryptors onto...
The U.S. National Security Agency, the U.K.’s National Cyber Security Centre, and partners from more than ten countries have attributed the global Salt Typhoon operations to three Chinese technology companies. Now, the FBI and...
Octosuite Octosuite is an open-source lightweight yet advanced osint framework that targets GitHub users and organizations. With over 20+ features, Octosuite only runs on 2 external dependencies. And returns the gathered intelligence in a...
GitHub has announced the launch of the public preview of the Grok Code Fast 1 model in Visual Studio Code. Access is being granted to users subscribed to the Copilot Pro, Pro+, Business, and...
NetScaler has issued an urgent advisory warning administrators of three newly discovered vulnerabilities in NetScaler ADC and NetScaler Gateway—one of which is already being actively exploited. Updates are now available, and the vendor strongly...
A newly discovered critical vulnerability in Docker Desktop has placed Windows users at significant risk. Tracked as CVE-2025-9074 and rated 9.3 out of 10 on the CVSS scale, the flaw enables attackers to bypass...
MathWorks, the developer of the widely used software MATLAB and SIMULINK, has disclosed a major ransomware attack that has impacted thousands of its users. The incident occurred in the spring of 2025, but its...
Drift has disclosed details of a security incident involving its Salesforce integration. Between August 8 and August 18, 2025, an unknown actor exploited OAuth credentials to extract data from customer Salesforce instances. According to...
For many years, Microsoft has built its cloud security strategy around hardware, and after a string of high-profile missteps, the company can no longer afford weak points. At the Hot Chips conference, Brian Kelly,...
In August of this year, specialists from Israel’s National Digital Agency uncovered a large-scale campaign known as ShadowCaptcha, designed to compromise users through more than a hundred hacked WordPress websites. These sites had been...
Researchers at Check Point Research have uncovered a new targeted campaign, dubbed ZipLine, which leverages the malicious tool MixShell against industrial and high-tech companies. The hallmark of this operation lies in its unorthodox delivery...
A cyberattack against the Israeli “kosher internet” provider Internet Rimon, which serves religious and ultra-Orthodox communities, disrupted its services on the evening of August 23. The Iranian group Promised Revenge has claimed responsibility. The...