11 Feb

Devilish devs spawn 287 Chrome extensions to flog your browser history to data brokers

They know where you’ve been and they’re going to share it. A security researcher has identified 287 Chrome extensions that allegedly exfiltrate browsing history data

Author rabih
11 Feb

Posting AI-generated caricatures on social media is risky, infosec killjoys warn

If you’ve seen the viral AI work pic trend where people are asking ChatGPT to “create a caricature of me and my job based on

Author rabih
11 Feb

Were telcos tipped off to *that* ancient Telnet bug? Cyber pros say the signs stack up

Telcos likely received advance warning about January’s critical Telnet vulnerability before its public disclosure, according to threat intelligence biz GreyNoise. Global Telnet traffic “fell off

Author rabih
11 Feb

Payroll pirates are conning help desks to steal workers’ identities and redirect paychecks

Exclusive When fraudsters go after people’s paychecks, “every employee on earth becomes a target,” according to Binary Defense security sleuth John Dwyer. In December 2025,

Author rabih
11 Feb

Notepad’s new Markdown powers served with a side of remote code execution

Just months after Microsoft added Markdown support to Notepad, researchers have found the feature can be abused to achieve remote code execution (RCE). Tracked as

Author rabih
11 Feb

Legacy systems blamed as ministers promise no repeat of Afghan breach

Legacy IT issues are hampering key technical measures designed to prevent highly sensitive data leaks, UK government officials say. On Tuesday, Parliament’s Science, Innovation and

Author rabih
10 Feb

Microsoft’s Valentine’s gift to admins: 6 exploited zero-day fixes

What better way to say I love you than with an update? Attackers exploited a whopping six Microsoft bugs as zero-days prior to Redmond releasing

Author rabih
10 Feb

AI agents spill secrets just by previewing malicious links

AI agents can shop for you, program for you, and, if you’re feeling bold, chat for you in a messaging app. But beware: attackers can

Author rabih
10 Feb

Singapore spent 11 months booting China-linked snoops out of telco networks

Singapore spent almost a year flushing a suspected China-linked espionage crew out of its telecom networks in what officials describe as the country’s largest cyber

Author rabih
10 Feb

Nearly 17,000 Volvo staff dinged in supplier breach

Nearly 17,000 Volvo employees had their personal data exposed after cybercriminals breached Conduent, an outsourcing giant that handles workforce benefits and back-office services. A filing

Author rabih
10 Feb

British Army splashes $86M on AI gear to speed up the battlefield kill chain

British soldiers are to get an array of AI-ready kit that should mean they don’t have to wait to see the “whites of their eyes”

Author rabih
10 Feb

Taxing times: Top IRS scams to look out for in 2026

It’s time to file your tax return. And cybercriminals are lurking to make an already stressful period even more edgy. Phil Muncaster 10 Feb 2026

Author rabih
09 Feb

Someone’s attacking SolarWinds WHD to steal high‑privilege credentials – but we don’t know who or how

Digital intruders exploited buggy SolarWinds Web Help Desk (WHD) instances in December to break into victims’ IT environments, move laterally, and steal high-privilege credentials, according

Author rabih
09 Feb

More than 135,000 OpenClaw instances exposed to internet in latest vibe-coded disaster

It’s a day with a name ending in Y, so you know what that means: Another OpenClaw cybersecurity disaster. This time around, SecurityScorecard’s STRIKE threat

Author rabih
09 Feb

Dutch data watchdog snitches on itself after getting caught in Ivanti zero-day attacks

The Dutch Data Protection Authority (AP) says it was one of the many organizations popped when attackers raced to exploit recent Ivanti vulnerabilities as zero-days.

Author rabih
09 Feb

Taiwan tells Uncle Sam its chip ecosystem ain’t going anywhere

Taiwan’s vice-premier has ruled out relocating 40 percent of the country’s semiconductor production to the US, calling the Trump administration’s goal “impossible.” In an interview

Author rabih
09 Feb

How the GNU C Compiler became the Clippy of cryptography

FOSDEM 2026 The creators of security software have encountered an unlikely foe in their attempts to protect us: modern compilers. Today’s compilers boil down code

Author rabih
09 Feb

Follow the money: Switzerland remains Europe’s top destination for tech pay

European techies looking for the biggest payday are far better off in Switzerland than anywhere else, with average salaries eclipsing all other countries on the

Author rabih
Load moreLoadingAll items loaded