Electric motorcycles and scooters face hacking risks to security and rider safety

In these days of technologically advanced and network-connected transportation devices, it has become increasingly common for vulnerabilities to exist in the systems of cars that can pose a security…
AI model Claude Opus turns bugs into exploits for just $2283

In recent weeks, there has been much concern over the impact of Anthropic’s latest AI model, Claude Mythos, and its ability to rapidly uncover previously unidentified vulnerabilities in code…
Nearly 4,000 US industrial devices exposed to Iranian cyberattacks

U.S. critical infrastructure operators are facing an active and ongoing cyber threat campaign attributed to Iranian state-aligned actors. Recent investigations indicate that thousands of…
The Trojan horse of cybercrime: Weaponizing SaaS notification pipelines

A new wave of cyberattacks has recently been detected by investigators exploiting existing infrastructure to deliver malicious content. This is not an unknown phenomenon, of course, but the new…
US Sanctioning Russian Broker for Buying Stolen Zero-Day Exploits.

The U.S. Treasury Department’s Office of Foreign Assets Control (OFAC) has imposed anctions on Matrix LLC (also known as Operation Zero), its owner Sergey Sergeyevich Zelenyuk, and several associated…
Massive Rainbow Six Siege Breach

On December 27–28, 2025, Ubisoft’s popular online shooter TomClancy’s Rainbow Six Siege experienced a major security breach that disrupted game operations and exposed serious vulnerabilities in its…
Threat Actors Exploit Calendar Subscriptions for Phishing and Malware Delivery

For many people in the professional world, digital calendars are an essential time-management tool. In many cases, to properly synchronize, multiple people or organizations will share an external…
Active Spyware Campaigns Hijacking High-Value Signal and WhatsApp Users

Multiple malicious actors are actively using commercial spyware and remote access trojans (RATs) to target users of secure mobile messaging apps, most notably Signal and WhatsApp. Rather than…
Cybercriminals Exploit RMM Tools to Infiltrate Shipping and Logistics Networks

It is well known by now that cybercrime can have real world consequences leading to financial losses, but those losses usually come in the form of stolen data rather than more concrete theft….
Stealthy attack serves poisoned web pages only to AI agents

AI agents have been a frequent subject of discussion on these pages. Many users are delighted at the prospect of an AI assistant to automate work for them, heedless of the potential security dangers….