cybersecurity

Cybersecurity is the practice of protecting computer systems, networks, and digital data from theft, damage, unauthorized access, or disruption. It involves implementing technologies, processes, and policies to safeguard information and ensure the confidentiality, integrity, and availability of digital assets.
  1. Samsung Accused of Preinstalling Israeli Spyware on Smartphones

    Samsung Accused of Preinstalling Israeli Spyware on Smartphones

    Samsung Accused of Preinstalling Israeli Spyware on Smartphones Samsung is facing sharp criticism after digital rights researchers claimed that certain Galaxy devices ship with a preinstalled application that behaves like Israeli-origin surveillance software. The controversy centers around...
  2. Anthropic Stops First AI-Driven Cyber Espionage Operation GTG-1002

    Anthropic Stops First AI-Driven Cyber Espionage Operation GTG-1002

    Anthropic Disrupts First AI-Driven Cyber Espionage Campaign GTG-1002 Anthropic’s threat intelligence team confirmed that it has stopped the first known case of a state-backed cyber espionage campaign executed predominantly by an artificial intelligence system. The operation, labelled GTG-1002...
  3. Longer AI Reasoning Makes Models Easier to Jailbreak, Study Finds

    Longer AI Reasoning Makes Models Easier to Jailbreak, Study Finds

    Longer AI Reasoning Makes Models More Vulnerable to Jailbreaks, Researchers Warn A new joint study by Anthropic, Stanford University, and the University of Oxford challenges one of the core assumptions in modern AI safety: that extending a model’s reasoning time makes it harder to exploit...
  4. Fake Ethereum Wallet in Chrome Web Store Steals Seed Phrases

    Fake Ethereum Wallet in Chrome Web Store Steals Seed Phrases

    Fake Ethereum Wallet in Chrome Web Store Steals User Seed Phrases A malicious browser extension masquerading as a secure Ethereum wallet has been discovered in the Chrome Web Store, ranking among the top search results and actively stealing users’ seed phrases. Blockchain security firm Socket...
  5. Kali NetHunter Developer Reveals 2025 Device Recommendations and Future Plans

    Kali NetHunter Developer Reveals 2025 Device Recommendations and Future Plans

    Kali NetHunter Developer Shares 2025 Device Picks and Teases New Features Attila Kalman, one of the core developers behind Kali NetHunter - the mobile pentesting platform built on Android - has given a rare in-depth interview discussing the project’s evolution, recommended hardware for 2025...
  6. Why Experts Urge an Immediate Shift to Post-Quantum Encryption

    Why Experts Urge an Immediate Shift to Post-Quantum Encryption

    Why the Shift to Post-Quantum Encryption Can’t Wait Any Longer A recent warning from smart-contract researcher Gianluca Di Bella at a UN event in Copenhagen reignited the debate on whether the world is prepared for quantum-powered attacks. According to him, waiting another decade could be a...
  7. Microsoft Uncovers “Whisper Leak” - AI Chat Privacy at Risk

    Microsoft Uncovers “Whisper Leak” - AI Chat Privacy at Risk

    Microsoft Uncovers “Whisper Leak” - AI Chat Privacy at Risk Microsoft has identified a major privacy vulnerability dubbed “Whisper Leak,” which could allow attackers to infer the topics of encrypted conversations with AI chatbots such as ChatGPT or Gemini. How the Vulnerability Works Although...
  8. LLM-powered malware changes cyber attack strategies

    LLM-powered malware changes cyber attack strategies

    AI Malware Revolution: How LLMs Transform Cyber Attacks Several new malware families are now using large language models (LLMs) to power adaptive hacking capabilities, according to Google's latest security research. These AI-driven threats dynamically generate malicious code, rewrite themselves...
  9. Researchers Discover 128 New Bluetooth Vulnerabilities in Modern Cars

    Researchers Discover 128 New Bluetooth Vulnerabilities in Modern Cars

    Researchers Discover 128 New Bluetooth Vulnerabilities in Modern Cars A new Usenix study has uncovered 128 vulnerabilities in automotive Bluetooth systems, exposing a wide range of vehicles to potential cyberattacks. The research highlights critical weaknesses in the way modern cars handle...
  10. Neon App Shuts Down After Massive Call Recording Data Breach

    Neon App Shuts Down After Massive Call Recording Data Breach

    Neon App Shuts Down After Massive Call Recording Data Breach The viral app that paid users to record their calls for AI training has abruptly gone offline after a major data leak exposed sensitive information. From Rapid Growth to Sudden Collapse In September 2025, the Neon app briefly topped...
  11. “CometJacking” Attack Turns AI Browser into Data-exfiltration Tool

    “CometJacking” Attack Turns AI Browser into Data-exfiltration Tool

    “CometJacking” Attack Turns AI Browser into Data-exfiltration Tool Security researchers say a newly discovered vulnerability - dubbed CometJacking - can weaponize AI-powered browsers to steal private data from services like Gmail and Google Calendar by injecting hidden instructions via URL...
  12. Discord Reveals Data Breach Exposing User Info Through Support Vendor

    Discord Reveals Data Breach Exposing User Info Through Support Vendor

    Discord Reveals Data Breach Exposing User Info Through Support Vendor Discord has confirmed a data breach that flew under the radar for over a month. The company says hackers infiltrated a third-party support platform, accessing user information - though passwords remain untouched. The Breach...
Top