Cybersecurity News
Stay up-to-date with the latest cybersecurity news and developments in the cybersecurity landscape. Be the first to know about the latest threats, current innovations, and major trends in the cyber universe. Check our Cyber News section for the freshest information.
HashJack Attack: How URL Fragments Turn AI Browser Assistants into a New Attack Surface
The rapid integration of AI assistants into web browsers — from Copilot in Microsoft Edge and Gemini in Google Chrome ...
Samourai Wallet Founders Sentenced: Impact on Bitcoin Mixers, Crypto Privacy and AML Compliance
The founders of Samourai Wallet and its integrated bitcoin mixing service Whirlpool have received prison sentences in the United States, ...
Tomiris APT Targets Russian and CIS Diplomatic Missions With New Cyber‑Espionage Wave in 2025
Since the beginning of 2025, researchers from Kaspersky have observed a new wave of targeted cyber‑espionage operations by the Tomiris ...
Critical MCP Vulnerability in Perplexity’s Comet AI Browser Sparks Security Debate
Security researchers at SquareX have disclosed a critical vulnerability in the Comet AI browser by Perplexity, linked to a poorly ...
GrapheneOS Pulls Infrastructure Out of France Over Encryption Regulation Concerns
The team behind GrapheneOS, one of the most prominent privacy‑ and security‑focused Android forks, is fully withdrawing its infrastructure from ...
PlushDaemon: How Router Hijacking Turns Software Updates into a Cyber‑Espionage Weapon
A newly documented cyber‑espionage campaign known as PlushDaemon demonstrates how attackers can abuse trusted software update mechanisms by first compromising ...
Criminal LLMs: How WormGPT 4 and KawaiiGPT Turn Generative AI into a Cybercrime Tool
Generative AI is no longer just a productivity tool for developers and enterprises. In parallel to legitimate platforms, an underground ...
Bloody Wolf Expands Targeted Cyber Attacks Across Central Asia with NetSupport RAT
A cybercrime group known as Bloody Wolf has launched a new wave of targeted attacks against organizations in Central Asia, ...
Tor Project Deploys Counter Galois Onion (CGO) to Upgrade Traffic Encryption
The Tor Project is rolling out a new traffic encryption algorithm, Counter Galois Onion (CGO), designed to replace its legacy ...
StealC V2 Infostealer Distributed via Malicious Blender .blend Files on 3D Marketplaces
Security researchers at Morphisec have identified a targeted malware campaign that abuses Blender, a popular open-source 3D creation suite, to ...