5RooxZ4FxY5xmJBQJTbfUU.jpg

That’s a new one: Iranian hackers pretend to be a modelling agency to try and steal user details

Unit 42 found a website spoofing a known German modelling agencyThe site carries obfuscated JavaScript which exfiltrates...
Continue →
KzVEENfW8FWnFYDeuWR573.jpg

Google Drive’s new Gemini features include video analysis at last – but be wary of possible security risks

Google Drive is getting new Gemini features to make the platform smarterThis include video summary and analytics toolsAI...
Continue →
hLthDCESVrWF6FGm2tAUuB.jpg

Security flaw in vBulletin forum software exploited by hackers

Security researchers find two flaws in vBulletinBoth are critical in severity, and can be chained for RCEOne of the flaw...
Continue →
4df2346ff72793b08163ca192630a245.jpg

Key Linux systems may have security flaws which allow password theft

Two information disclosure vulnerabilities were found in Apport and core-dump handlerThey affect Ubuntu, Fedora, and Red...
Continue →
G45LLJfFcFCJNWbpjSenwM.jpg

Why your biometric data will soon be more valuable than money

Biometric data, fingerprints, facial scans or iris patterns have long been a key to seamless digital identity. Whether u...
Continue →
Vomc44iEJRp67copJb9SHm.jpg

Time to upgrade? WhatsApp has just dropped support for these older iPhones and Android phones

WhatsApp has stopped supporting a number of older Apple and Android devicesThe change came into effect on June 1 after a...
Continue →
B5xwtCjoeodzKJ8rEKargN.jpg

The One UI 8 beta could extend to older devices soon – these Galaxy phones could be next in line for Android 16

There's evidence that the One UI 8 beta is expandingSupport could go back to the Galaxy S22 phonesA full software launch...
Continue →
CZT3XwUSqPTtkwHfk9fuyX.jpg

UK military building “pioneering battlefield system” with new Cyber and Electromagnetic Command

The UK Government is investing in cyber defences and capabilities£1 billion investment includes a new Cyber and Electrom...
Continue →
YbizeHRMkF5QLe6eeYypqc.jpg

The security debt of browsing AI agents

At 3 a.m. during a red team exercise, we watched customer’s autonomous web agent cheerfully leak the CTO’s credentials -...
Continue →
7DtE9RCVmUtmH2FAfvxsvM.jpg

Why hacking yourself first is essential for proactive cybersecurity

In an increasingly complex cybersecurity landscape, the concept of "hacking yourself first" is not new as such. Organiza...
Continue →