With record reports of bear attacks on humans, Japan has been increasingly turning to high-tech solutions, as you might expect. However, reports suggest that Ohta Seiki, a firm making the animatronic robot Monster Wolf to repel bears from human-habituated areas, can’t keep up with demand. “We cannot make them fast enough,” company president Yuji Ohta told AFP. This year’s order book for Monster Wolf has already hit 50 units. Hokkaido-based Ohta Seiki usually doesn’t even manufacture that ma
All Articles (3008)
A new report from Google Threat Intelligence Group (GTIG) reveals a coordinated campaign exploiting an AI-generated zero-day vulnerability. The attack targets an unnamed open-source web administration tool, using the flaw to bypass two-factor authentication (2FA). The researchers say they identified an active threat actor utilizing large language models (LLMs) to actively discover and weaponize software vulnerabilities in the wild.
As the targeted flaw involves a high-level semantic logic bug
Europe is pouring more than €2 billion into sovereign cloud initiatives designed to reduce exposure to US legal reach. The EU's IPCEI-CIS program funds infrastructure development. France qualifies operators under SecNumCloud, a framework with nearly 1,200 technical requirements promising "immunity from extraterritorial laws."
But most datacenters and qualified cloud operators still rely heavily on Intel or AMD processors. And inside those processors sits a computer beneath the computer: manag
The FBI have remotely reset thousands of home and small office routers after releasing a joint press release detailing how Russia has been compromising devices.
Some brands of routers are known for lasting upwards of a decade, and while that's great for the consumer, the developers will often stop releasing updates to keep the router secure. This leaves them open to compromise by attackers, specifically Russia’s Main Directorate of the General Staff (GRU), tracked as APT28 or Fancy Bear, which
The Port of Long Beach has opened a new Cyber Defense Operations Center (CDOC) dedicated to protecting the seaport from cyberattacks, utilizing monitoring and threat analysis to secure the digital infrastructure of one of the busiest maritime gateways in the United States.
The Port of Long Beach in California says that it currently stops an attempted cyberattack approximately every three seconds, highlighting the constant threat to the $300 billion in trade handled annually by the complex. The
The fragile global semiconductor supply chain is facing a major snag. Samsung Electronics has officially entered “emergency management mode,” actively preparing for a potential full-scale shutdown of its ultra-advanced automated production lines amid an impending strike following the collapse of labor negotiations. According to South Korean industry reports, the tech giant is actively preparing for a worst-case scenario: a full-scale shutdown of its ultra-advanced automated production lines du
The use of steganography in the threat landscape continues to accelerate. Threat actors are increasingly shifting from direct encrypted transfers to a 'legitimate-file-plus-hidden-data' model, effectively masking their next-stage payloads within everyday media.
FortiGuard Labs recently uncovered a phishing campaign that abuses environment variables to hide malicious commands and uses PawsRunner as a Steganography Loader to deploy the .NET infostealer PureLogs.[1]
Crypto wallet owners using Ledger hardware wallets are being targeted through physical mail, with scammers impersonating the company in a campaign designed to steal recovery seed phrases. The operation uses printed letters that look official, complete with Ledger branding, a reference number, and a fake security notice warning recipients about an urgent “Quantum Resistance” update.
One example of the scam circulating online shows an Italian language version addressed to a customer in Italy, sug
Cybersecurity researchers at Point Wild recently found a new way that cyber-attackers are gaining unauthorized access to computers. The investigation, led by experts Kedar Shashikant Pandit, Prathamesh Shingare, and Amol Swami from the Lat61 Threat Intelligence Team, reveals that a common tool used by legitimate developers is being twisted by hackers to hide a nasty malware called XWorm.
Attack Details - The attack starts with a trick email or a fake software update, involving a harmless-lookin
A Brazilian tech firm that specializes in protecting networks from distributed denial-of-service (DDoS) attacks has been enabling a botnet responsible for an extended campaign of massive DDoS attacks against other network operators in Brazil, KrebsOnSecurity has learned. The firm’s chief executive says the malicious activity resulted from a security breach and was likely carried out by a competitor seeking to tarnish his company’s public image.[1]
For the past several years, security experts ha
Potholes, or some say chuck holes, are a troublesome problem. Just ask scooter company Lime, which listed them as an official risk to its business in its recent IPO filing. History is littered with claims that technology can help solve or blunt the problem of potholes, and still they persist. But as cars become increasingly laden with advanced sensors, they are becoming a tool that can quickly alert cities to potholes and other municipal problems.[1]
Last month, Waymo and Waze announced a pilo
Google is rolling out a new opt-in feature in Android that aims to help security researchers investigate spyware attacks. The feature is called “Intrusion Logging” and is part of Android’s Advanced Protection Mode, which Google launched last year, an opt-in special security mode that enables certain features with the goal of making the device harder to hack. Advanced Protection Mode is designed to counter government spyware attacks and police forensic devices that try to extract data from a pe
On 28 April 2026, SentinelLABS located a script through a Kubernetes-focused VirusTotal hunting rule that stood out from known cloud hack tools: the script’s first actions are to evict and delete tools associated with the TeamPCP attack group, leading us to call the toolset PCPJack. Analyzing this script led researchers to discover a comprehensive framework for cloud credential harvesting and propagation to internal and external systems.
TeamPCP stood out in early 2026 following the group’s Feb
In the cybersecurity world, we often assume that small and medium-sized businesses (SMBs) are the lagging indicators of digital maturity. But new research from Tech.co and Expert Market suggests that SMB leaders are becoming surprisingly surgical in their tech adoption. The data reveal a major pivot in 2026: while many organizations are pulling back AI for general business tasks, automated cybersecurity remains a non-negotiable priority. As inflation pressures and tech regret drive a more sel
A new report from the Cyber Defence Centre at Ontinue has found a campaign targeting software developers with fake installation pages that look like official sites for AI tools like Claude Code.
The attack begins when a user searches for ‘install Claude code’ and clicks on a sponsored result. This link goes to a lookalike page that shows an installation command. While the real command uses the host ‘claude.ai,’ the fake version uses ‘events.msft23.com.’ Running this command enables Invoke-Rest
A second serious flaw affecting the Linux kernel has been disclosed within weeks, prompting calls for emergency defensive measures from kernel developers. The newly revealed vulnerability, nicknamed "Dirty Frag," allows attackers with low-level access to an affected system to gain full administrative control, according to security researchers and Linux distribution maintainers.
The flaw was discovered by independent researcher Hyunwoo Kim, who said it affects the same area of the Linux kernel i
In the manufacturing sector, the traditional boundary between "the network" and "the floor" has effectively dissolved. According to Trackforce's executive trends report, Cyber-Physical Security Convergence in Manufacturing, the manufacturing world is entering an era where operational uptime is inseparable from cybersecurity posture. For cybersecurity professionals, this shift means that protecting data is no longer the sole objective; the new mandate is protecting operational continuity. When
A recent analysis report by Surfshark found that, among global data breaches, South Africa ranks 42nd in Q1 2026. Globally, 210.3 million accounts were breached, with the US ranking first at 29% of all breaches from January through March. France takes second place, followed by India, Brazil, and the UK.[1] Surfshark is a consumer-focused cybersecurity and privacy product suite.
Since 2004, South Africa has been the second-most breached country in Africa, with 45.7 million compromised user acc
An ongoing data extortion attack targeting the widely-used education technology platform Canvas disrupted classes and coursework at school districts and universities across the United States, after a cybercrime group defaced the service’s login page with a ransom demand that threatened to leak data from 275 million students and faculty across nearly 9,000 educational institutions.
Canvas parent firm Instructure responded to today’s defacement attacks by disabling the platform, which is used by t
A Florida man who worked as a ransomware negotiator at a US cyber incident response firm has pleaded guilty to conspiring with the BlackCat/ALPHV ransomware group, feeding the attackers confidential information about his own clients while simultaneously negotiating on their behalf. Angelo Martino, 41, of Land O'Lakes, Florida, admitted to providing BlackCat operators with clients' insurance policy limits and internal negotiation strategies without his employer's or clients' knowledge. The oper