All Articles (2715)

Sort by

13694030264?profile=RESIZE_400xThere’s at least one expert who believes that “the singularity,” the moment when artificial intelligence surpasses the control of humans; could be just a few years away.  That’s a lot shorter than current predictions regarding the timeline of AI dominance, especially considering that AI dominance is not exactly guaranteed in the first place.

Ben Goertzel, CEO of SingularityNET, who holds a Ph.D. from Temple University and has worked as a leader of Humanity+ and the Artificial General Intelligenc

13695592472?profile=RESIZE_400xThe US Cybersecurity and Infrastructure Security Agency (CISA) on 13 August 2025 added two security flaws impacting N-able N-central to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation.  N-able N-central is a Remote Monitoring and Management (RMM) platform designed for Managed Service Providers (MSPs), allowing customers to efficiently manage and secure their clients' Windows, Apple, and Linux endpoints from a single, unified platform.[1]

The vulnerabilit

13676113701?profile=RESIZE_400xThis reads like a James Bond movie.  Chinese scientists have been devising sophisticated ways to destroy Elon Musk’s Starlink satellite network, including using stealth submarines fitted with space-shooting lasers, amid Chinese government fears that the technology poses a risk to its strategic interests.  As of 2025, China's military, specifically the People's Liberation Army Navy (PLAN), is estimated to operate between 65 and 75 submarines. This fleet includes both nuclear-powered and diesel-el

13689590274?profile=RESIZE_400xThe North Korean state-backed hacker group tracked as ScarCruft recently took the unusual step of infecting targets with ransomware alongside other malicious files, researchers said.  ScarCruft, primarily known for cyber-espionage campaigns against high-profile individuals and government entities, used “newly observed” ransomware as part of the operation, analysts at South Korean cybersecurity firm S2W said in a report this week.

The researchers labeled the ransomware VCD after the extension it

13689602266?profile=RESIZE_400xExperts have warned hackers recently used a generative AI tool to replicate several web pages belonging to the Brazilian government in an effort to steal sensitive personal information and money.  The fake websites were examined by Zscaler ThreatLabz researchers, who discovered multiple indicators of the use of AI to generate code.  The websites look almost identical to the official sites, with the hackers using SEO poisoning to make the websites appear higher in search results, and therefore se

13694010860?profile=RESIZE_400xIn early July 2025, a new DarkCloud campaign was observed in the wild by Fortinet’s FortiGuard Labs team.  It began with a phishing email containing an attached RAR archive. Fortinet subsequently investigated this campaign and conducted a step-by-step analysis.  DarkCloud is a known stealthy Windows-based information-stealer malware that was first identified in 2022. It is designed to steal sensitive information from the victim’s computer, including saved login credentials, financial data, conta

13676113084?profile=RESIZE_400xA leading cybersecurity, privacy, and data protection firm, Vipre Security Group, has released its Q2 2025 Email Threat Landscape Report, highlighting a significant shift in cybercriminal tactics.  The report, based on an analysis of global real-world data, uncovers a growing reliance on hyper-personalized, AI-driven phishing techniques that exploit human vulnerabilities rather than traditional technological tricks.  This evolution in email-based threats is raising alarms for organizations world

13676288857?profile=RESIZE_400xThe Fortinet/FortiMail Workspace Security team recently identified a targeted intrusion campaign impacting multiple Israeli organizations.  The adversary leveraged compromised internal email infrastructure to distribute phishing messages across the regional business landscape.  These emails initiated a multi-stage, PowerShell-based infection chain that culminated in the delivery of a remote access trojan (RAT), executed entirely through PowerShell.

Key characteristics include:

  • Full PowerShell-b

13676122864?profile=RESIZE_400xUS law enforcement agencies provided new details on an operation that dismantled critical infrastructure used by the BlackSuit ransomware gang after the organization’s leak site was replaced with a takedown banner nearly two weeks ago.

The group, which rebranded from its Royal name after a devastating 2023 attack that shut down the City of Dallas, successfully attacked more than 450 entities in the US.   Since emerging in 2022, the gang secured more than $370 million in ransom payments, accordin

13676106673?profile=RESIZE_400xVendor-related risks, from both tech providers and non-tech partners, have always been a concern, but they’re now becoming increasingly apparent in a growing number of cyber insurance claims.  While data breaches were once the main concern, we are now seeing more severe first-party losses caused by ransomware attacks and major system outages.  These issues are not always the result of a cyberattack, either.  Sometimes they come from non-malicious errors, like critical system failures or software

13676103863?profile=RESIZE_400xGen Z has often been hailed as the most tech-savvy generation in history.  But new research from Kaspersky suggests that their hyper-connected, gig-driven lifestyle may also be making them one of the most vulnerable.  In a recent report, Kaspersky warns that "polyworking," a growing trend among Gen Z workers juggling multiple part-time jobs, freelance gigs, or side hustles, is creating an unprecedented cybersecurity challenge. With a widened digital footprint, these digital natives are increasin

13675134278?profile=RESIZE_400xSecurity researchers this past week which detailed a series of vulnerabilities that could allow hackers to steal sensitive data from devices using Broadcom’s ControlVault, a special chip widely used in security-focused Dell laptops.

ControlVault is system-on-chip (SoC); effectively a tiny computer that is dedicated to security and isolated from the normally modifiable parts of the device. As its name suggests, it is intended to be a kind of vault for sensitive data; Dell describes it as “a secur

13674221101?profile=RESIZE_400xA job search platform exposed over 5 million resumes, putting millions of job seekers at risk of identity theft, targeted scams and fraud.  The leak, discovered by cybersecurity researchers at Cybernews, comes from a misconfigured Microsoft Azure storage container that is accessible on the Internet.  The unsecured cloud bucket contained more than 5.1 million files, predominantly resumes and CVs, dating from 2016 to 2025.[1]

The breach is linked to LiveCareer, a platform founded in 2004 that prov

13675123653?profile=RESIZE_400xThe US can dreadfully report that they are #1 in malware activity.  Canada is #2.  Not to be outdone, the UK is now the third most targeted country in the world for malware after seeing over 100 million cyber-attacks over the past three months, this according to a new report.  Research from cyber security firm NordVPN found that criminals are increasingly targeting everyday internet users through links in emails and texts, as well as through malicious websites and attachments.[1]

The UK now rank

13674476697?profile=RESIZE_400xA recent Varonis report exposes a rising threat: cyber criminals exploiting Microsoft OneNote to launch “native” phishing campaigns via Microsoft 365. OneNote is a well-established digital note-taking app that provides a single place for keeping users' reminders, research and project information.  These attacks exploit trust in legitimate collaboration tools, combining social engineering and cloud infrastructure to bypass traditional defenses.  This new attack vector uses shared OneNote notebook

13674811660?profile=RESIZE_400xThe  Fortinet team recently investigated a cluster of virtual private servers (VPS) used for Monero mining.  The identified samples are associated with prior H2miner campaigns that researchers documented in 2020 and have since been updated with new configurations.  H2Miner is a Crypto mining botnet that has been active since late 2019.

Analysts also identified a new variant of the Lcryx ransomware, called Lcrypt0rx. Lcryx is a relatively new VBScript-based ransomware strain first observed in Nov

13674219865?profile=RESIZE_400xThe dating safety app Tea was hacked, resulting in the leak of images, posts, and comments from thousands of users who shared anonymous “red flag” reports on men.  Tea is a woman-only dating safety app launched in 2023 that lets users assess and review potential partners using real-time safety tools, not matchmaking. The app has over 1.6 million members in the US. It allows them to perform background checks on men and anonymously share “red-flag” behavior.

The app offers real-time tools like rev

13674465487?profile=RESIZE_400xRussian authorities shut down mobile internet services more than 2,000 times in July, which is a record monthly high, as Russia escalates its digital restrictions in the name of cyber security.  This presented through a report from the nonprofit Russian Internet Protection Society.  Local authorities often cut off access to the internet, citing “national security” amid Ukrainian drone attacks.   However, rights groups and digital watchdogs say many of the blackouts appear unrelated to any real t

13674217693?profile=RESIZE_400xThe Cybersecurity Team at SafetyDetectives has uncovered a post on a clear web forum where a threat actor claimed to be selling a database containing 61 million records allegedly belonging to Verizon customers.  The data, packaged in a 3.1 GB CSV/JSON file and dated as “2025,” was offered for purchase on a platform known for hosting discussions on database leaks, cracks, and downloads.  Clear web forums, accessible to anyone with an internet connection, are popular among hackers for sharing and

13674213889?profile=RESIZE_400xA recently disclosed vulnerability in train braking systems could let hackers remotely stop trains with relatively simple and inexpensive hardware, potentially causing derailments, according to the US Cybersecurity & Infrastructure Security Agency (CISA).  The high-severity vulnerability, tracked as CVE-2025-1727, involves weak authentication in the protocol used to send what are known as end-of-train and head-of-train packets, radio signals that command a rail vehicle’s end-of-train device to s