Android 16 will introduce alerts for users when connecting to fake cell towers or unencrypted networks, helping combat unauthorized surveillance…
Read More »cybersecurity threats
The CVE Program has launched two new working groups, the CVE Consumer Working Group (CWG) and CVE Researcher Working Group…
Read More »Scattered Spider, a group of young hackers, has surged in cyberattacks on critical industries using social engineering to exploit corporate…
Read More »A pro-Russia disinformation campaign is using freely available AI tools to spread fabricated content online, targeting elections, immigration, and the…
Read More »Critical cybersecurity vulnerabilities in Linux SOHO devices (LapDogs), WinRAR (CVE-2025-6218), and Notepad++ (CVE-2025-49144) demand urgent patching to prevent unauthorized access…
Read More »Cyber threats are shifting toward stolen credentials and built-in system tools, requiring proactive security measures as traditional perimeter defenses become…
Read More »ICE's use of facial recognition via the Mobile Fortify app on smartphones raises privacy and civil liberties concerns, with critics…
Read More »ClickFix attacks, exploiting human psychology through deceptive error messages, surged by 517% in 2025, becoming the second most prevalent cyber…
Read More »Online scams are increasingly sophisticated, prompting Trend Micro's Scam Radar to offer real-time protection by identifying emerging threats before damage…
Read More »Quantum computing has advanced to crack small RSA keys (22-bit), signaling future threats to global encryption standards, though current 2048-bit…
Read More »Quantum computing advancements pose an imminent threat to traditional encryption, requiring immediate action to protect sensitive data from emerging risks.…
Read More »16 billion login credentials were exposed online, posing risks for major platforms like Facebook, Apple, and Google, with urgent calls…
Read More »Ransomware group Qilin has added a “Call Lawyer” feature to its affiliate toolkit, allowing attackers to simulate legal threats during…
Read More »The largest recorded DDoS attack reached 7.3 terabits per second, flooding a target with 37.4 terabytes of traffic in 45…
Read More »The electric grid faces growing challenges from climate change, cybersecurity threats, and the transition to renewables, requiring resilient infrastructure and…
Read More »Files encrypted with the .rgPrGzyZY extension indicate a severe ransomware attack, locking data until a ransom is paid, though experts…
Read More »The GodFather malware has evolved to hijack legitimate mobile apps using advanced virtualization, enabling real-time data theft without triggering security…
Read More »Cybercriminals use Google ads to inject fake customer support numbers into legitimate websites like Apple and Microsoft, tricking users into…
Read More »APT group Silver Fox has launched a focused attack on Taiwanese entities using a combination of HoldingHands RAT and a…
Read More »Cybercriminals, particularly the hacking group Scattered Spider, are increasingly targeting U.S. insurance companies, shifting from previous attacks on U.K. retail…
Read More »

















