At the Black Hat conference in Las Vegas, representatives from VisionSpace Technologies demonstrated that disabling a satellite or altering its trajectory can be achieved far more easily — and at a fraction of the...
Radio communications used by intelligence agencies, law enforcement, and military forces across dozens of countries have been found vulnerable to interception — and the flaw lies not only in outdated algorithms, but also in...
AppShark Appshark is a static analysis tool for Android apps. Its goal is to analyze very large apps (Douyin currently has 1.5 million methods). Appshark supports the following features: JSON-based customized scanning rules to...
Cybersecurity researchers have uncovered 11 malicious Go packages designed to download additional components from remote servers and execute them on both Windows and Linux systems. According to Socket researcher Olivia Brown, during execution the...
Linux adoption on business desktops and laptops continues to climb. An analysis of nearly 18.5 million devices shows that Linux’s share among business endpoints rose from 1.6% in January to 1.9% in June 2025....
Let’s Encrypt has officially retired its OCSP (Online Certificate Status Protocol) service, replacing it with CRL (Certificate Revocation Lists). As the organization reminded, OCSP URLs have not been included in certificates since April 2025,...
Two malicious packages have been discovered in the NPM ecosystem, disguised as libraries for building bots and automated services using the WhatsApp Business API. Identified by researchers at Socket, these modules mimicked popular WhatsApp...
The new Linux 6.17 kernel introduces a unified standard for the so-called “performance button” increasingly found on gaming laptops. This key now has an assigned unique code—KEY_PERFORMANCE—allowing Linux systems to properly recognize it and...
Akira ransomware attacks are growing ever more sophisticated: threat actors have begun exploiting a legitimate Intel CPU tuning driver to disable Windows’ built-in protections. The driver in question—rwdrv.sys, part of the ThrottleStop utility—is registered...
In a new apartment in Tel Aviv, the lights suddenly switch off, smart blinds rise on their own, and the water heater powers up—without the tenants’ knowledge. This is not part of a “smart...
At the Black Hat USA conference in Las Vegas, Naor Haziz, a researcher at Sweet Security, unveiled an attack dubbed ECScape, capable of completely undermining the trust-based security model of Amazon ECS. The vulnerability...
Six years ago, researchers at PortSwigger first identified a fundamental flaw in the HTTP/1.1 protocol—one that enables HTTP Request Smuggling attacks. Despite being publicly known since 2019, the vulnerability remains unresolved and continues to...
Hackers have breached the electronic case management system of the U.S. federal courts, gaining access to confidential information, including the identities of protected witnesses. The incident, which affected multiple district courts across several states,...
Google has officially confirmed that hackers gained unauthorized access to one of its corporate Salesforce databases and exfiltrated data related to small and medium-sized business clients. The disclosure appears in an updated June bulletin...
Meta is waging an intense campaign against organized scam networks in Southeast Asia, where dozens of fraudulent schemes operate in parallel. In just the first half of the year, more than 6.8 million WhatsApp...
OpenAI has unveiled GPT-5, its new flagship artificial intelligence model, now available to all ChatGPT users and developers. Company CEO Sam Altman described it as “a leap you won’t want to come back from,”...