The Trump administration is planning to allocate $1 billion over the next four years toward offensive operations in cyberspace. These funds will be disbursed through the Department of Defense as part of a sweeping...
There is no shortage of protective tools today, yet unfortunately, the number of threats continues to outpace them—particularly those that operate subtly and invisibly, penetrating the very core mechanisms of an operating system. Detecting...
The Open-Ended Working Group (OEWG) on security and the use of information and communication technologies (ICTs) in the context of international security has concluded its work in New York. After nearly five years of...
Each month, millions of users visit websites offering so-called “undressing” services—platforms that use generative AI to transform ordinary images of women and girls into fabricated nude depictions. A recent investigation by Indicator has revealed...
A counterfeit extension for the Cursor AI development environment, masquerading as a legitimate Ethereum utility, has resulted in a major cybersecurity incident—a Russian cryptocurrency developer lost half a million dollars due to the extension’s...
Over the weekend, an employee of the Department of Government Efficiency (DOGE), an agency under Elon Musk’s purview, inadvertently exposed a confidential key that granted direct access to over 50 of xAI’s language models....
In mere seconds, AI is now capable of designing proteins that can eliminate superbugs and combat cancer. Australian researchers have become the first in the country to harness artificial intelligence to generate a fully...
A high-profile incident has recently concluded within the Solana ecosystem, involving the unauthorized extraction of cryptocurrency assets from the Texture project. Several days ago, an unidentified hacker exploited a vulnerability in one of the...
The Gemini AI assistant, integrated into Google Workspace, has unexpectedly proven vulnerable to a novel form of social engineering. By exploiting a particular method of structuring content within emails, malicious actors can deceive the...
BinPool is a dataset consisting of vulnerable and patched binaries derived from historical Debian packages, compiled using four different optimization levels. It can be used for vulnerability discovery tasks through various methods, including machine...
Cloudflare has reported a temporary disruption affecting its public DNS resolver, 1.1.1.1, an issue that drew complaints from users around the globe. According to available data, the incident began on the evening of July...
Security researchers from GitGuardian and Synacktiv have uncovered a critical vulnerability in Laravel, the widely used PHP framework that powers hundreds of thousands of web applications. The issue stems from the leakage of the...
Fortinet has released critical security updates for FortiWeb, addressing a severe vulnerability that allowed unauthenticated attackers to execute arbitrary SQL queries remotely. The flaw, tracked as CVE-2025-25257, received a CVSS score of 9.6, placing...
NVIDIA has issued a warning about a newly discovered vulnerability in its graphics processing units, dubbed GPUHammer. This attack, rooted in the well-known RowHammer technique, enables malicious actors to corrupt data belonging to other...
A hacker who siphoned $40 million in cryptocurrency from the decentralized exchange GMX has returned nearly the entire haul in exchange for a $5 million payout. The breach ranked among the largest in DeFi...
Microsoft has unveiled a new feature for Windows 11 that could prove to be a true lifeline for users when their computer suddenly fails to boot. This innovation, known as Quick Machine Recovery—or simply...