Blog: Technology and Cybersecurity News
-
HP Releases Fix for Vulnerability in Support Assistant Tool
In a recent security advisory, HP has announced the discovery of a critical vulnerability in its HP Support Assistant software, which is used on a wide range of HP laptops and desktops. The flaw could…
-
World’s First Biological Computer Uses Human Neurons and Silicon for Scientific Research
Cortical Labs, an Australia-based biotechnology company, has released the CL1, the world’s first code-deployable biological computer powered by lab-grown human neurons. Available at a price of $35,000, the machine combines living neural networks with silicon…
-
iVerify Finds Evidence of Potential Hidden iPhone Attacks
iVerify, a mobile MDR (Managed Detection and Response) software company, has identified signs that some iPhones may have been targeted by highly sophisticated, covert hacking techniques. These attacks are believed to involve “zero-click” exploits—methods that…
-
Fake AI Tools and Websites Used to Distribute Malware
In an environment where AI tools are becoming increasingly integral to innovation and daily operations, cybercriminals are seizing the opportunity to exploit this trend. Recent research from Talos, Cisco’s threat intellegence research organization, has uncovered…
-
Malicious Fake Caching Plugin Used to Steal WordPress Admin Credentials
Cybersecurity researchers have identified a new tactic used by attackers to compromise WordPress sites. A fake caching plugin, named wp-runtime-cache, has been discovered hiding in the plugin directory of affected sites. While it appears to…
-
Research Shows Leak Of 80+ Million AT&T Customer Records
A database potentially containing the personal information of more than 86 million AT&T customers has been leaked online. The data, first reported by Hackread, showed inclusion of customer names (full name), dates of birth, phone…
-
Malwarebytes Launches Scam Guard to Help Protect Users from Mobile Scams
Sammers are constantly developing new ways to deceive people—using AI to craft convincing phishing emails, orchestrating sextortion schemes that prey on shame, or creating fake job offers and emergencies to steal money or personal data.…
Categories:
Have any comments or suggestions? Feel free to let us know!