Your weekly cybersecurity roundup covering the latest threats, exploits, vulnerabilities, and security news you need to know.
If you wanted to steal local files from someone using Perplexity's Comet browser, until last month you could just schedule ...
Abstract: The increasing deployment of wind power systems has raised concerns about their vulnerability to cyberattacks due to remote locations and insecure communication protocols. False data ...
A native macOS application for overriding geolocation data reported by web browsers and the operating system. Built with SwiftUI, targeting macOS 14 (Sonoma) and later. Developed by Terabitlab.
In yet another software supply chain attack, the open-source, artificial intelligence (AI)-powered coding assistant Cline CLI was updated to stealthily install OpenClaw, a self-hosted autonomous AI ...
Biometric injection attacks are emerging as the key vulnerability in biometric remote identity verification and user authentication systems, making assurance that protections against them are ...
Hackers use prompt injection to steal the private data you use in AI. ChatGPT's new Lockdown Mode aims to prevent these attacks. Elevated Risk labels warn you of AI tools and content that could be ...
Abstract: This paper addresses the attack detection problem for cyber-physical systems subject to false data injection attacks. A novel detection framework is developed for cyber-physical systems ...
Threat actors are abusing Pastebin comments to distribute a new ClickFix-style attack that tricks cryptocurrency users into executing malicious JavaScript in their browser, allowing attackers to ...
iProov, the world's leading provider of science-based biometric identity verification solutions, today announced that its Dynamic Liveness technology is the first and only solution to successfully ...
Microsoft patched a high-severity command injection vulnerability in Windows Notepad through its February 2026 Patch Tuesday updates that allows attackers to execute malicious code remotely via ...