All Articles (2798)

Sort by

31040384276?profile=RESIZE_400xSaint Nicholas, known as the patron saint of children and sailors, was born in the third century in the town of Patara, in present-day Turkey.  Renowned for his generosity and compassion, Nicholas dedicated his life to helping those in need, often performing acts of kindness in secret.  The most famous story tells how he tossed bags of gold through a poor family's window at night to provide dowries for three daughters, saving them from hardship.  Over time, his selfless actions inspired many, an

31040392494?profile=RESIZE_400xA sophisticated phishing toolkit named Spiderman has emerged on the dark web, enabling cybercriminals to mimic login pages of central European banks and cryptocurrency exchanges without requiring coding knowledge.  Sold as a ready-to-use package, the kit lowers barriers for fraudsters, allowing rapid deployment of deceptive campaigns that harvest sensitive credentials in real time.  Security researchers warn that such tools signal a growing democratization of cybercrime, where even novices can e

31040380055?profile=RESIZE_400xGiving businesses the freedom to do their thing while we maintain national security is much more difficult than it looks.  Two stories from last week show how much harder it is.  For two decades now, the jewels of our industry have been vanishing or turning red.  In their different ways, iRobot and ASML shed light on a crisis no one really wants to acknowledge.

Last week, iRobot filed for bankruptcy and was immediately acquired by Picea Robotics, its China-based contract manufacturer.  You may k

31039561495?profile=RESIZE_400xA slogan for the State of Michigan presents, “Say Yes to Michigan.”  Well saying yes is easier than it appears.  Plans for a massive new Oracle data center in the US State of Michigan have been left in limbo after funding talks with its key financial partner broke down.  As reported by the Financial Times, Blue Owl Capital, which has backed some of Oracle's largest data center projects, will not support the proposed $10 billion facility in Saline Township, near Ann Arbor MI.[1]

The project is in

31040391480?profile=RESIZE_400xThe question was deceptively simple.  Could the light that is used to form an image on a display also be converted into something that can be felt?  At the University of California - Santa Barbara, a team of researchers spent nearly a year exploring this idea, working through theoretical models, conducting simulations, and eventually building prototypes.  Their work, described in the paper Tactile Displays Driven by Projected Light and explored in TechXplore, has led to a significant breakthroug

31040395500?profile=RESIZE_400xSentinelLABS has been researching how large language models (LLMs) are impacting cybersecurity for both defenders and adversaries.  As part of our ongoing efforts in this area and our well-established research and tracking of crimeware actors, researchers have been closely following the adoption of LLM technology among ransomware operators.  Analysts have observed that three structural shifts appear to be unfolding in parallel.

First, the barriers to entry continue to fall for those intent on cy

31040389294?profile=RESIZE_400xArtificial intelligence has become the most disruptive technology in cybersecurity.  It is transforming how defenders detect threats, how attackers build new tools, and how organizations must redesign their entire security strategy.  In 2025, AI is no longer an enhancement to security systems. It has become the core engine behind both cyber defense and cyber offense.  This shift brings opportunities, challenges, and new responsibilities for every security leader.[1]

AI is revolutionizing how def

31039529656?profile=RESIZE_400xMinisters want companies like Apple and Google to build nudity-detection algorithms directly into their operating systems, preventing users from taking photos or sharing explicit images of children unless they have verified that they are adults. 

Under the proposal, adults would need to confirm their age, potentially through biometric checks or official identification, to disable the blocks and create or access such content.[1]

People familiar with matter told the Financial Times that the measur

31039951068?profile=RESIZE_400xCoinbase Inc. lost a private arbitration complaint with damages and costs totaling $618,000 to a client who claimed to lose funds after a 2024 cyber-attack.  The complaint of Ashok Maini versus Coinbase Inc. was heard in private arbitration in the forum of the American Arbitration Association, commonly referred to as Triple A arbitration in the industry.  Arbitration complaints involving cryptocurrencies are outside the purview of FINRA Dispute Resolution because digital assets are not legally d

31037133458?profile=RESIZE_400xHundreds of Porsche cars in Russia became undrivable after their factory-installed satellite security system malfunctioned, owners and dealers report.  Drivers in several Russian cities reported sudden engine shutdowns and fuel-delivery interruptions after Porsche cars lost satellite-alarm-module connectivity, leaving all models at risk of self-locking, according to the dealership group Rolf.  The problem appears to be caused by the Vehicle Tracking System (VTS), which is an onboard module.[1]

A

31036833856?profile=RESIZE_400xIn the cybersecurity community, the ability to see a threat before it strikes defines who stays safe and who gets hit. This was the central theme of Check Point’s recent Threat Intelligence live AMA Reddit webinar, where leading experts from Check Point Research (CPR) and External Risk Management (ERM) Research (formerly Cyberint) offered rare, behind-the-scenes insights into how they track, predict, and prevent attacks at machine speed.
These experts are :

  • Sergey Shykevich – Head of Threat Int

31027522884?profile=RESIZE_400xThe US, DHS Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning concerning malicious cyber actors using commercial spyware programs to target messaging applications.  CISA's alert highlights that various threat actors employ sophisticated targeting and social engineering methods to deliver spyware and gain unauthorized access to users' messaging applications.  This initial access then facilitates the deployment of additional malware, leading to more extensive access to t

31037135098?profile=RESIZE_400xWhile analyzing one of the affiliate programs, Doctor Web’s researchers discovered a unique piece of malware with clicker functionality and called it a Trojan.ChimeraWire. This malware targets computers running Microsoft Windows and is based on the open-source projects zlsgo and Rod for automated website and web application management.

Trojan.ChimeraWire allows cybercriminals to simulate user actions and boost a website's behavioral ranking by artificially increasing its search engine rankings.

31037127652?profile=RESIZE_400xWhen programmers encounter puzzling code, their brains react in measurable ways.  Now, researchers have shown that large language models (LLMs) exhibit similar signs of confusion when reading the same code.  In a study from Saarland University and the Max Planck Institute for Software Systems, scientists compared human brain activity with LLM uncertainty and found striking alignment.  Wherever humans struggled, the models did too.  This discovery, described in the paper “How do Humans and LLMs P

31027112062?profile=RESIZE_400xArizona Attorney General Kris Mayes is suing Temu, a large online marketplace founded in 2022.  According to a 02 December 2025 press release, Temu violated the Arizona Consumer Fraud Act through "unlawful data collection, violations of customers' privacy, and counterfeiting some of Arizona's most iconic brands."  Temu is best known for allowing primarily Chinese sellers to sell products directly to Western consumers, including those in the US.  Mayes accused Temu of harvesting sensitive user da

31026998058?profile=RESIZE_400xConsumers are urged to exercise caution this Christmas shopping season, as new research from McAfee Labs indicates a significant increase in brand impersonation by cybercriminals.  The Tech giants Apple, Nintendo, and Samsung, alongside luxury labels like Coach, Dior, and Gucci, are among the most frequently faked brands targeted by scammers.   McAfee’s analysis of festive shopping scams is based on real-world web activity data collected between October and November 2025, specifically focusing o

31036941268?profile=RESIZE_400xThe slow-motion Russian invasion of Ukraine has highlighted persistent vulnerabilities in Western military readiness, specifically concerning munitions stockpiles, supply chain resilience, and procurement agility.  As the conflict continues, nations are adjusting their force posture and defense planning.  These changes aim not only to support Ukraine but also to prepare for the realities of prolonged, multi-domain warfare.

While quantum computing and automation are shaping the following stages o

31036802288?profile=RESIZE_400xIn an age where artificial intelligence is increasingly trusted to judge human expression, a subtle but essential flaw has emerged.  Large language models (LLMs), the same systems that generate essays, screen job applications, and moderate online discourse, appear to evaluate content fairly, until they’re told who wrote it.  A new study by researchers Federico Germani and Giovanni Spitale at the University of Zurich, published in Science Advances, reveals that LLMs exhibit systematic bias when t

31017416255?profile=RESIZE_400xUS DHS, CISA, along with authoring organizations, assess pro-Russia hacktivist groups are conducting less sophisticated, lower-impact attacks against critical infrastructure entities, compared to advanced persistent threat (APT) groups.  These attacks use minimally secured, internet-facing virtual network computing (VNC) connections to infiltrate (or gain access to) OT control devices within critical infrastructure systems.  Pro-Russia hacktivist groups: Cyber Army of Russia Reborn (CARR), Z-Pen

31016873059?profile=RESIZE_400xThe Hoxhunt 2025 Cyber Threat Intelligence Report delivers a sobering message for security professionals: the most dangerous threats are no longer the most obvious ones.  As 2026 approaches, enterprises are no longer fighting clumsy, error-riddled bulk spam; they are facing a quiet revolution where sophisticated, convincing attacks blend seamlessly into daily workflows, fueled by AI and advanced token-theft toolkits.

See:  https://hoxhunt.com/guide/threat-intelligence-report

The report, based on