Tag Directory / CYBERSECURITY     showing 361–380 of 555   RSS



Hyundai tells Ioniq 5 owners it will fix keyless security flaw – for a $65 "contribution"

techspot - Kia, Hyundai, and Genesis EVs have been targeted by thieves in the UK and other locations in recent times who use a handheld emulation device disguised to look like a Game Boy. It features radio transmission components that crack the wireless protocols us…

#cybersecurity #infosec #cars #security

6 months / techspot


Back to Top / Monday, August 11, 2025, 11:20 am / permalink 12057 / 2 stories in 6 months


It Looks Like a School Vape Detector. A Teen Hacker Showed It Could Become an Audio Bug

Joseph Cox / 404media - The Halo 3C is a vape detector installed in schools and public housing. A young hacker found it contains microphones and that it can be turned into an audio bug, raising privacy concerns.

#cybersecurity #cybercrime #education #privacy

Back to Top / Friday, August 8, 2025, 9:20 am / permalink 11921 / 2 stories in 6 months


Bouygues Telecom confirms data breach impacting 6.4 million customers

Bill Toulas / bleepingcomputer - Bouygues Telecom warns it suffered a data breach after the personal information of 6.4 million customers was exposed in a cyberattack. [...]

#cybersecurity #dataprivacy #scam

Back to Top / Thursday, August 7, 2025, 1:21 pm / permalink 11860 / 3 stories in 6 months


Air France and KLM disclose data breaches impacting customers

Sergiu Gatlan / bleepingcomputer - Air France and KLM announced on Wednesday that attackers had breached a customer service platform and stolen the data of an undisclosed number of customers. [...]

#cybersecurity #dataprivacy #aviation #security

Back to Top / Thursday, August 7, 2025, 9:21 am / permalink 11835 / 2 stories in 7 months


Microsoft warns of serious vulnerability in hybrid Exchange deployments

Sofia Elizabella Wyciślik-Wilson / betanews - Microsoft has issued a warning about a high-severity vulnerability in hybrid Microsoft Exchange Server deployments. Tracked as CVE-2025-53786, the vulnerability could allow for privilege escalation by cyber threat actors with administrative access to an o…

#cybersecurity #infosec #microsoft

7 months / therecord


Back to Top / Thursday, August 7, 2025, 8:21 am / permalink 11829 / 6 stories in 7 months


An invisible prompt in a Google Doc made ChatGPT access data from a victim’s Google Drive

Maximilian Schreiner / the-decoder - A single manipulated document was enough to get ChatGPT to automatically extract sensitive data—without any user interaction.The article An invisible prompt in a Google Doc made ChatGPT access data from a victim’s Google Drive appeared first on THE DECODE…

#cybersecurity #dataprivacy #chatgpt #cybercrime

6 months / bgr

6 months / techspot


Back to Top / Thursday, August 7, 2025, 8:21 am / permalink 11825 / 4 stories in 7 months


OpenAI’s new GPT-5 models announced early by GitHub

Tom Warren / theverge - GitHub has accidentally announced OpenAI’s new range of GPT-5 models. A now-deleted GitHub blog post reveals that GPT-5, which will be available in four different versions, offers “major improvements in reasoning, code quality, and user experience.” Reddi…

#ai #cybersecurity #openai #chatgpt

7 months / bgr

7 months / bgr

7 months / bgr


Back to Top / Thursday, August 7, 2025, 3:20 am / permalink 11812 / 8 stories in 7 months


There's a Tea app for men, and it also has security problems

Anna Washenko / engadget - Tea bills itself as a safety dating app for women, allowing users to anonymously share details about men they have met. A new app called TeaOnHer has emerged that attempts to flip the script, with men sharing information about women they date. And while T…

#cybersecurity #infosec #apps #security

Back to Top / Wednesday, August 6, 2025, 6:20 pm / permalink 11785 / 2 stories in 7 months


Hackers Used An Infected Calendar Invite To Hack Gemini And Take Control Of A Smart Home

bgr - The dangers of AI are becoming increasingly apparent, as hackers found a way to use Google's Gemini chatbot to take over a stranger's smart home devices.

#cybersecurity #infosec #cybercrime #hack

7 months / bgr


Back to Top / Wednesday, August 6, 2025, 1:20 pm / permalink 11762 / 4 stories in 7 months


Microsoft unveils Project Ire, an AI system that automatically detects malware

Maximilian Schreiner / the-decoder - Microsoft has unveiled Project Ire, an AI system designed to automatically analyze software files and determine whether they contain malware.The article Microsoft unveils Project Ire, an AI system that automatically detects malware appeared first on THE D…

#ai #cybersecurity #automation #microsoft

7 months / bgr


Back to Top / Wednesday, August 6, 2025, 12:20 pm / permalink 11750 / 4 stories in 7 months


Microsoft’s ‘Agentic Web’ Ambition Hit by Embarrassing Security Flaw

Markus Kasanmascheff / winbuzzer - A critical security flaw in Microsoft's new NLWeb protocol raises questions about its 'agentic web' strategy, despite a quick patch from the company.The post Microsoft’s ‘Agentic Web’ Ambition Hit by Embarrassing Security Flaw appeared first on WinBuzzer.

#cybersecurity #infosec #microsoft #security

Back to Top / Wednesday, August 6, 2025, 10:20 am / permalink 11731 / 3 stories in 7 months


Cohere’s new AI agent platform, North, promises to keep enterprise data secure

Rebecca Bellan / techcrunch - Canadian AI firm Cohere is taking aim at alleviating data privacy concerns with its new AI agent platform, North, which can be deployed privately so that enterprises and governments can keep their, and customers', data safe behind their own firewalls.

#ai #cybersecurity #enterprise #cloudsec

Back to Top / Wednesday, August 6, 2025, 9:20 am / permalink 11726 / 3 stories in 7 months


UK MoD taps Australian cybersecurity startup Castlepoint after Afghan data breach

Lucy Adams / tech - Britain's Ministry of Defence (MoD) has selected Australian firm Castlepoint Systems to provide services for automating data classification and reducing the risk of human error. The company is now hea...

#cybersecurity #infosec #defensetech #uk

Back to Top / Wednesday, August 6, 2025, 7:21 am / permalink 11716 / 2 stories in 7 months


WhatsApp launches new tools to stop scammers

Sofia Elizabella Wyciślik-Wilson / betanews - WhatsApp is now an essential communication tool for both personal and business use, and its popularity means that it is also a prime target for scammers. As such, the company has just announced the rollout of a new series of tools designed to help keep us…

#cybersecurity #apps #scam

Back to Top / Wednesday, August 6, 2025, 7:21 am / permalink 11714 / 3 stories in 7 months


Dell fixed security chip vulnerability that left millions open to attack

Brad Bennett / mobilesyrup - Tens of millions of Dell laptops were recently discovered to have a vulnerability that could have allowed hackers to steal sensitive data from users and monitor some of their computer activities. Dell validated this security analysis in June, and it appea…

#cybersecurity #infosec

Back to Top / Tuesday, August 5, 2025, 4:20 pm / permalink 11679 / 2 stories in 7 months


WhatsApp Bans 6.8 Million Scam Accounts in Global Crackdown

John Quintet / iphoneincanada - WhatsApp says it blocked more than 6.8 million accounts linked to global scam operations in the first half of this year, part of a growing crackdown on criminal networks that often rely on forced labour and organized crime in Southeast Asia. ers. Tech sca…

#cybersecurity #internet #apps #scam

Back to Top / Tuesday, August 5, 2025, 12:21 pm / permalink 11647 / 5 stories in 7 months


NVIDIA Patches Critical Triton Server Vulnerabilities Enabling Full AI System Takeover

Markus Kasanmascheff / winbuzzer - NVIDIA has patched critical RCE flaws in its Triton Inference Server after Wiz Research found an exploit chain allowing full AI system takeover. Update now.The post NVIDIA Patches Critical Triton Server Vulnerabilities Enabling Full AI System Takeover app…

#cybersecurity #infosec #nvidia #gpu

Back to Top / Tuesday, August 5, 2025, 12:21 pm / permalink 11645 / 2 stories in 7 months


Hacker used a voice phishing attack to steal Cisco customers’ personal information

Lorenzo Franceschi-Bicchierai / techcrunch - Cisco disclosed a data breach including customer names, organization names, addresses, email addresses, and phone numbers of Cisco.com users.

#cybersecurity #dataprivacy #infosec

Back to Top / Tuesday, August 5, 2025, 11:21 am / permalink 11642 / 5 stories in 7 months


SonicWall urges customers to disable SSLVPN amid reports of ransomware attacks

Zack Whittaker / techcrunch - Security researchers say they have evidence that ransomware gangs are hacking into large companies that rely on fully-patched SonicWall firewalls. The researchers say it's likely the flaw is a "zero-day" bug currently unknown to SonicWall.

#cybersecurity #infosec #cloudsec

Back to Top / Tuesday, August 5, 2025, 10:20 am / permalink 11632 / 3 stories in 7 months


Cloudflare Blocks Perplexity for Skirting Web Scraping Rules: What’s at Stake?

Azdhan / medianama - Cloudflare blocks Perplexity AI bots for violating anti-scraping rules and masking crawler identity.The post Cloudflare Blocks Perplexity for Skirting Web Scraping Rules: What’s at Stake? appeared first on MEDIANAMA.

#cybersecurity #infosec #cloudsec #internet

7 months / pymnts / PYMNTS


Back to Top / Tuesday, August 5, 2025, 8:21 am / permalink 11617 / 7 stories in 7 months


Back to Top


CYBERSECURITY Heatmap


90 days, weeks are vertical, left is older; hover for info, click to see that day's coverage.



More Top Stories...


Oracle and OpenAI scrap Texas data-center expansion; Meta eyes the spare capacity

Oracle and OpenAI have abandoned plans to expand a flagship Texas data center, leaving substantial compute capacity up for grabs. Nvidia reportedly brokered interest from Meta to take the unused slots as OpenAI downscales that particular buildout, a move that rattled markets and highlights shifting demand for large-scale on-prem AI infrastructure. More...


CISA, Google and US agencies flag Coruna iOS exploit kit in active use

U.S. agencies and security teams have raised alarms about “Coruna,” a powerful iOS exploit kit tied to spyware and crypto-theft campaigns. Google’s threat unit traced the toolkit’s activity while CISA ordered federal mitigations for the targeted iOS flaws, urging rapid patching as investigators hunt for origins and victims. More...


OpenAI launches Codex Security agent to automatically detect software vulnerabilities

OpenAI rolled out Codex Security, an AI agent that scans codebases to find complex vulnerabilities, suggests actionable fixes, and uses sandbox testing to limit false positives. The tool has already flagged issues in major projects and aims to compete with traditional application security tooling by automating deep, contextual code review. More...


U.S.-Iran strikes roil markets and satellite imagery firms amid fresh attacks

A recent round of retaliatory strikes between the U.S. and Iran has immediate spillovers: defense analytics firm shares jumped on expected demand, major chipmaker stock fell amid geopolitical jitters, and a commercial satellite imagery provider paused public image distribution to prevent adversarial use for battle-damage assessment. Markets and imagery services scrambled for damage control. More...


MWC 2026 in Barcelona spotlights robots, modular phones and AI concepts

At Mobile World Congress 2026 in Barcelona, vendors showcased experimental phones, AI‑powered robots, modular concepts and comfort bots. The event highlighted abundant prototype innovation and radical design experiments — from stackable convertible phones to Leica‑branded camera collaborations — even as questions linger about real‑world consumer adoption and manufacturing timelines. More...



NorthFeed Inc.

Disclaimer: The information provided on this website is intended for general informational purposes only. While we strive for accuracy, we do not guarantee the completeness or reliability of the content. Users are encouraged to verify all details independently. We accept no liability for errors, omissions, or any decisions made based on this information.