The Pakistani cyber-espionage group APT36, also known as Transparent Tribe, has launched a sophisticated new phishing campaign targeting personnel within India’s defense sector. Experts at CYFIRMA have uncovered that the threat actors are employing...
At the international Botconf conference held in May 2025 in Angers, France, experts from NICT CSRI unveiled the findings of their three-year investigation into the RapperBot malware. Their conclusions were alarming: this evolved variant...
Experts at NeuralTrust have reported a newly identified and dangerous method of bypassing neural network safeguards, dubbed Echo Chamber. This technique enables bad actors to subtly coax large language models (LLMs)—such as ChatGPT and...
The messaging application WhatsApp, owned by Meta, has been officially banned from use on all devices issued to staff members of the United States House of Representatives. A corresponding notice was circulated among Congressional...
The British Cyber Monitoring Centre (CMC) has released its first official assessment of the damage caused by recent cyberattacks that disrupted major retail chains across the country. According to estimates, total financial losses range...
The United States has issued a warning regarding potential cyberattacks from pro-Iranian groups following a series of airstrikes on Iran’s nuclear facilities—strikes that have escalated into an armed conflict between Iran and Israel, which...
In May, Telegram launched what appeared to be a decisive strike against the shadowy Chinese-speaking underworld of cryptocurrency fraud by blocking its largest marketplaces—platforms rife with services for money laundering, the trade of stolen...
Users weary of pervasive surveillance and incessant advertising have long sought ways to reclaim a measure of control over their digital lives. Yet one must ask—what assurance exists that the latest privacy solution is...
A large-scale cyber-espionage campaign has been uncovered in Canada, reportedly orchestrated by a threat group known as Salt Typhoon, which authorities believe is linked to China. The operation was disclosed in a joint advisory...
Trend Micro recently received a confidential report from a security researcher disclosing a critical vulnerability in WinRAR version 7.11 and earlier. This high-risk flaw allows threat actors to execute arbitrary code by crafting malicious...
As support for Windows 10 is scheduled to end on October 14, 2025, Microsoft has introduced a paid Extended Security Updates (ESU) program for individuals and organizations unable to transition to Windows 11. Through...
UUSEC WAF Web Application Firewall is an industrial grade free, high-performance, and highly scalable web application and API security protection product that supports AI and semantic engines. It is a comprehensive website protection product launched...
One of the world’s leading cryptocurrency tracking platforms, CoinMarketCap, has fallen victim to a sophisticated cyberattack. Visitors to the site were unexpectedly confronted with intrusive Web3 pop-ups, seemingly inviting them to connect their wallets....
Your personal photographs are increasingly becoming the target of malicious actors. Smartphones have long since evolved from mere communication tools into vast repositories of intimate data—ranging from vacation plans and cherished family photos to...
Chinese engineers have unveiled a new generation of laser weaponry that has already garnered significant interest among defense technology experts and industrial manufacturers. The innovation centers around a portable 2-kilowatt laser system, capable of...
The OpenVPN team has issued a warning regarding a vulnerability found in the Windows driver of its VPN client, which could allow malicious actors to crash the system. Catalogued as CVE-2025-50054, the flaw was...