Several weeks ago, Argentine users began reporting unusual incidents of Telegram account compromises to cybersecurity experts. What made the situation particularly alarming was that the takeovers occurred without any action on the part of...
This week, Paris became the stage for intricate diplomatic negotiations aimed at curbing the unchecked proliferation and use of commercial hacking tools. France and the United Kingdom jointly unveiled the Pall Mall Process, an...
In the first quarter of 2025, the gaming platform Steam unexpectedly topped the list of the most frequently impersonated brands by phishing actors. This revelation comes from Guardio, a cybersecurity firm, following an analysis...
A LinkedIn user has demonstrated how a counterfeit passport, generated using ChatGPT-4o, successfully passed a digital identity verification process. The experiment ignited intense debate among cybersecurity professionals and cast serious doubt on the continued...
For six years, General Paul Nakasone held dual command over two of the United States’ most critical agencies: the National Security Agency (NSA) and U.S. Cyber Command. Following his departure, Nakasone adopted a more...
Yet another cryptocurrency theft has underscored the fact that cybercriminals are not above targeting even the smallest of projects when a quick profit is within reach. This time, the victim was UPCX, a blockchain-based...
Previous reports suggested that Apple intends to terminate its Apple Card credit card partnership with Goldman Sachs. Following speculation that Apple might pivot to a collaboration with American Express, new claims have emerged indicating...
Apple is set to host its Worldwide Developers Conference (WWDC) 2025 on June 9, during which the company will unveil the developer preview of iOS 19 and announce the list of supported devices for...
Cybercriminals continue to refine their malware delivery mechanisms, and the latest iteration of Hijack Loader stands as a vivid testament to this trend. Researchers at Zscaler have uncovered a newly enhanced version of the...
North Korean IT operatives have increasingly infiltrated European companies under the guise of remote employees. According to Google’s Threat Intelligence Group, actors from the DPRK have ramped up activity in countries such as Germany,...
In the course of an ongoing malicious campaign, over 1,500 PostgreSQL servers have been compromised and repurposed for covert cryptocurrency mining. Researchers at Wiz revealed that the attackers operate entirely in-memory, without writing files...
Amid the 21st anniversary of Gmail’s launch, Google has unveiled a major update that brings end-to-end encrypted email closer to widespread adoption within the corporate sphere. As of yesterday, the new feature has begun...
The cybercriminal group FIN7—also known by aliases such as Carbon Spider, ELBRUS, and Gold Niagara—has once again surfaced, this time deploying a tool named Anubis. Contrary to the well-known Android trojan of the same...
Following its legacy of reinforced glass innovations, Corning has unveiled its latest advancement: Gorilla Glass Ceramic—a next-generation protective material engineered from transparent, high-strength glass-ceramic. This new offering promises superior drop resistance, particularly when compared...
In Indiana, a prominent professor renowned for his work in cryptography, privacy, and system security has mysteriously vanished. Days before a series of FBI raids, his university profile disappeared from the institution’s website, his...