Subscribe below for free to get these delivered straight to your inbox
North Korean hacking group Kimsuky is using Android malware called Plankwalk to hijack Google’s Find My Device service, allowing them to locate and remotely wipe data.
The government shutdown poses a grave cybersecurity risk. Neglected patching, staffing cuts, and accumulating vulnerabilities create a ticking time bomb for federal digital defenses.
A 2019 review of the year’s top mobile security stories. Learn about the dominant threats, including iPhone jailbreaks, rogue Android apps, 5G risks, and mobile phishing.
Reports confirm a Lockbit 3.0 Black ransomware variant is encrypting files and appending the .3R9qG8i3Z extension. Learn the verifiable facts about this attack.
Microsoft has announced the first test build for Windows 11 26H1, Build 26052, for the Canary and Dev Channels. The update is aimed at ‘specific silicon.’
Factual report on the .3R9qG8i3Z ransomware incident, identified as a Phobos variant. Details include the attack vector, ransom note, and decryption status.
A forgotten Bell Labs DECtape from 1973 has been analyzed, revealing what appears to be the lost source code for Unix v4, an important piece of computing history.
Six months after Dan Kaminsky’s critical DNS vulnerability disclosure, 1-3% of servers still face cache-poisoning attacks. Threats to DNS, mail servers, and SSL persist.
Learn how cybersecurity experts are tackling ‘secrets sprawl’ to protect sensitive cloud data. This summary covers key strategies for managing API keys and passwords.
A 2025 analysis of 11,000+ hacktivist posts reveals how groups use Telegram and hashtags to launch global DDoS attacks. Learn how to decode their signals.
South Korean Foreign Minister Cho Tae-yul met Cambodian PM Hun Manet to strengthen cooperation against criminal cyberscams and protect citizens from trafficking.
Reports indicate the European Commission is exploring mandatory rules to force EU member states to phase out Huawei and ZTE from 5G telecom networks due to security risks.
The U.S. government is considering a ban on TP-Link networking gear over China security risks. Learn about the allegations, TP-Link’s defense, and your options.
Chief Information Security Officers are effectively securing larger budgets by shifting their communication to focus on financial metrics, ROI, and business risk.
An overview of Google’s Gemini 3.0 Pro, a multimodal AI model. Learn about its key features, including a 1 million token context window and MoE architecture.
A major AWS outage in the US-EAST-1 region raises expert concerns over its prolonged recovery time, highlighting the fragile interdependencies of cloud services.
Researchers discovered an AI-generated ransomware test extension on the official VS Code marketplace, which initially slipped past Microsoft’s vetting process.
Netflix has dropped the second season of its reality competition ‘Squid Game: The Challenge.’ The announcement also serves as an open forum for security news.
Nevada’s government details a ransomware attack, from initial breach via a trojanized admin tool to a 28-day recovery without paying ransom. Learn how the state responded and improved defenses.
The Department of Homeland Security is developing a fleet of AI-powered trucks for remote border surveillance, featuring autonomous operation and advanced sensors.
Learn the difference between a true burner phone for total anonymity and an ‘altphone’ for compartmentalizing your life. This guide covers how to set them up.
DeFi protocol BetterBank suffered a $1.4M net loss after an attacker exploited a reward minting flaw that was identified in a prior security audit but not fixed.
The EU is considering a mandatory ban on high-risk vendors like Huawei and ZTE from member countries’ 5G networks, according to a recent Bloomberg News report.
Facial recognition technology is increasingly essential but fails for millions with facial differences, locking them out of government and financial services due to AI bias.
Anthropic and the NNSA have collaborated to create a ‘nuclear classifier’ for the AI Claude to prevent misuse. This post covers the project and expert debate.
A new report from the Institute of Strategic Dialogue reveals how AI chatbots like ChatGPT and Gemini are citing sanctioned Russian media and spreading propaganda.
Microsoft has uncovered ‘Whisper Leak,’ a novel side-channel attack that allows adversaries to infer AI chat topics by observing encrypted network traffic.
U.S. and U.K. authorities charge two UK teens, alleged members of Scattered Spider, in connection with $115M in ransoms and numerous high-profile cyberattacks.
Discover five core practices for securing containers from build to runtime. Learn how engineering and security teams can manage container risk and vulnerabilities.
Cybercrime group TA558 is targeting the travel industry with fake reservation emails that deliver RAT malware via ISO and RAR files. Learn their new tactics.
Stop relying on your browser’s limited password manager. Discover why dedicated apps offer superior security, features, and support for new tech like passkeys.
New study: Women, minorities, and lower-income individuals face higher cybercrime rates, stress, and financial impact. Demographics significantly influence online safety.
Containers offer agility but introduce security risks. Learn why robust container security from build to runtime is crucial for engineering and security teams to manage vulnerabilities at scale.
Kaspersky integrates a new machine learning model into its SIEM to detect DLL hijacking, successfully uncovering real-world attacks using Cobalt Strike and info-stealers.
Mexico City is the most surveilled city in the Americas, expanding its C5 network to over 100,000 cameras. Explore the security goals vs. public safety reality.
A former L3Harris Trenchant executive has pleaded guilty to selling $1.3M in sensitive hacking tools and trade secrets to a Russian software brokerage firm.
A malicious npm package, ‘https-proxy-utils,’ was found distributing the AdaptixC2 post-exploitation framework to Windows, macOS, and Linux developers.
Discover the best and most secure VPNs for your iPhone. Our guide covers top-rated picks like NordVPN, ProtonVPN, and Windscribe for speed, privacy, and ease of use.
Kaspersky will host a 60-minute webinar on May 22, 2025, to discuss its Scan Engine, focusing on its advanced protection features and integration capabilities.
Amidst growing scientific pessimism about AI, a call to action urges researchers to champion a positive vision to steer the technology toward beneficial outcomes.
Learn how Kaspersky successfully trained a three-generation machine learning model to detect stealthy DLL hijacking attacks with high accuracy and few false positives.
The massive Aisuru IoT botnet manipulated Cloudflare’s top domain rankings by flooding its DNS service with queries, forcing the company to scrub the malicious domains.
You must be logged in to post a comment.