AArtificial intelligence Read More Featured Chrome Browser Extension Caught Intercepting Millions of Users’ AI ChatsDecember 16, 2025 A Google Chrome extension with a “Featured” badge and six million users has been observed silently gathering every…
TTechnology Read More Apple Issues Security Updates After Two WebKit Flaws Found Exploited in the WildDecember 13, 2025 î ‚Dec 13, 2025î „Ravie LakshmananZero-Day / Vulnerability Apple on Friday released security updates for iOS, iPadOS, macOS, tvOS, watchOS,…
BBusiness Read More Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell VulnerabilityDecember 5, 2025 î ‚Dec 05, 2025î „Ravie LakshmananVulnerability / Software Security Two hacking groups with ties to China have been observed weaponizing…
BBreaking News Read More Ransomware’s Fragmentation Reaches a Breaking Point While LockBit ReturnsNovember 14, 2025 Key Takeaways: 85 active ransomware and extortion groups observed in Q3 2025, reflecting the most decentralized ransomware ecosystem…
AArtificial intelligence Read More Microsoft Uncovers ‘Whisper Leak’ Attack That Identifies AI Chat Topics in Encrypted TrafficNovember 8, 2025 Microsoft has disclosed details of a novel side-channel attack targeting remote language models that could enable a passive…
TTechnology Read More Samsung Mobile Flaw Exploited as Zero-Day to Deploy LANDFALL Android SpywareNovember 8, 2025 î ‚Nov 07, 2025î „Ravie LakshmananMobile Security / Vulnerability A now-patched security flaw in Samsung Galaxy Android devices was exploited…
TTechnology Read More Chrome Zero-Day Exploited to Deliver Italian Memento Labs’ LeetAgent SpywareOctober 28, 2025 The zero-day exploitation of a now-patched security flaw in Google Chrome led to the distribution of an espionage-related…
TTechnology Read More Newly Patched Critical Microsoft WSUS Flaw Comes Under Active ExploitationOctober 25, 2025 Microsoft on Thursday released out-of-band security updates to patch a critical-severity Windows Server Update Service (WSUS) vulnerability with…
TTechnology Read More Five New Exploited Bugs Land in CISA’s Catalog — Oracle and Microsoft Among TargetsOctober 21, 2025 î ‚Oct 20, 2025î „Ravie LakshmananThreat Intelligence / Data Security The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday…
BBusiness Read More F5 Breach Exposes BIG-IP Source Code — Nation-State Hackers Behind Massive IntrusionOctober 15, 2025 î ‚Oct 15, 2025î „Ravie LakshmananVulnerability / Threat Intelligence U.S. cybersecurity company F5 on Wednesday disclosed that unidentified threat actors…
CComputing Read More OPINION: Unitary Executive Theory is a bad idea for computers, a worse one for presidentsOctober 7, 2025 Cybersecurity incidents have been in the news lately. Due to the disruptive and destructive nature of such incidents,…
AArtificial intelligence Read More One Click Can Turn Perplexity’s Comet AI Browser Into a Data ThiefOctober 4, 2025 î ‚Oct 04, 2025î „Ravie LakshmananAgentic AI / Enterprise Security Cybersecurity researchers have disclosed details of a new attack called…