A recently identified vulnerability in Perplexity’s Comet AI browser has raised significant security concerns. This flaw allows attackers to inject malicious prompts through seemingly harmless […]
Year: 2025
SpaceX Deactivates Over 2,500 Starlink Terminals Linked to Scam Operations in Myanmar
In a decisive move to prevent the misuse of its technology, SpaceX has deactivated more than 2,500 Starlink satellite internet terminals associated with scam centers […]
Samsung Galaxy S25 Zero-Day Vulnerability Exploited to Activate Camera and Track Location
At the Pwn2Own Ireland 2025 cybersecurity competition, researchers Ben R. and Georgi G. from Interrupt Labs demonstrated a significant security flaw in the Samsung Galaxy […]
Salt Typhoon’s Advanced Cyber Espionage Tactics: Zero-Day Exploits and DLL Sideloading
Since 2019, Salt Typhoon, a China-linked advanced persistent threat (APT) group, has been conducting sophisticated cyber espionage campaigns targeting critical infrastructure worldwide. Also known as […]
Microsoft Enhances Windows Security by Disabling File Previews for Downloaded Files
In an effort to bolster security measures against credential theft, Microsoft has implemented a significant update to Windows File Explorer. Starting with security updates released […]
Emergence of ChaosBot: A Rust-Based Malware Utilizing Discord for Covert Command and Control
In the ever-evolving landscape of cybersecurity threats, a new and sophisticated malware strain named ChaosBot has surfaced, demonstrating advanced capabilities in evading detection and maintaining […]
The Escalating Threat of Stealer Malware: A Deep Dive into Credential Theft Operations
In recent years, the cybercriminal landscape has witnessed a significant transformation with the rise of stealer malware—a category of malicious software designed to infiltrate systems […]
Vidar Stealer 2.0: Advanced Malware Bypasses Chrome Security to Extract Credentials
Vidar Stealer, a notorious information-stealing malware first identified in 2018, has undergone a significant transformation with the release of version 2.0. This latest iteration introduces […]
Apple’s Ongoing Legal Battle Over App Store Payment Policies
Apple is currently engaged in a legal battle concerning its App Store payment policies. The dispute centers on a contempt ruling issued by U.S. District […]
The Unintended Consequences of Going Viral: How an Apple Store Employee’s Name Change Reflects the Power of the Internet
In the digital age, a single online post can catapult an individual into the global spotlight, often with unforeseen repercussions. Such was the case for […]