Cybersecurity
Cybersecurity
Hacker flaunts stolen government data on Instagram
Nicholas Moore pleaded guilty to repeatedly hacking the US Supreme Court’s electronic filing system.
New court filings say he also accessed AmeriCorps and...
Cybersecurity
Hackers are exploiting a critical WordPress flaw in Modular DS
Modular DS versions 2.5.1 and older have a critical security flaw
Attackers can bypass authentication and gain admin access remotely
The issue is...
Cybersecurity
Pax8 data exposure puts thousands of MSP relationships under scrutiny
Pax8 accidentally emailed a spreadsheet containing sensitive partner and customer business data.
Around 1,800 MSPs were affected through a file shared with fewer...
Cybersecurity
Hackers Allege Massive Theft of Target Source Code After Cyber Incident
Hackers claim to be selling 860GB of internal Target source code and documentation
Sample repositories reference payment, identity, and gift card systems
Target...
Cybersecurity
US Agencies Urged to Patch Actively Exploited Gogs Flaw
Gogs has a high severity flaw that allows remote code execution without authentication.
The vulnerability is actively exploited and hundreds of servers are...
Cybersecurity
Europol Raids Deal Heavy Blow to Black Axe Cybercrime Network
Spanish police arrested 34 suspected Black Axe members in coordinated raids across four major cities
The group is linked to large scale cyber...
Cybersecurity
CrowdStrike moves deeper into identity security with SGNL deal
CrowdStrike plans to acquire SGNL for about $740 million in a mostly cash deal
The acquisition strengthens CrowdStrike’s identity security for AI and...
Cybersecurity
Can Public Charging Cables Really Steal Your Data in 2026?
Use your own cable whenever possible
Never approve trust prompts on unknown chargers
Keep your phone software fully updated
Public charging is usually...
Cybersecurity
Phantom Shuttle Exposed How Trusted Chrome Extensions Became Silent Spies
Phantom Shuttle Chrome extensions secretly rerouted traffic through attacker owned proxies
Roughly 170 high value websites were selectively targeted for credential and data...
Cybersecurity
OpenAI Admits the Hard Truth About Securing Agentic Browsers
Prompt injection attacks resemble social engineering and may never be fully eliminated
Agentic browsers increase risk by combining autonomy with broad access
OpenAI...
Cybersecurity
Surfshark Brings Dedicated IP Support to Linux Desktop
Dedicated IP is now built into Surfshark’s Linux GUI app
Linux users no longer need browser extensions for static IP access
Fewer CAPTCHAs...
