Apple has released new security updates specifically for older iPhones and iPads to fix dangerous flaws that hackers have been actively using to break into devices. These issues were part of a sophisticated attack method that allowed cybercriminals to secretly gain access to personal data, including sensitive information like messages, accounts, and even digital wallets. […]
Cybersecurity researchers have uncovered a new wave of attacks in which threat actors are exploiting FortiGate firewall devices as entry points into targeted networks. These devices, commonly used to secure enterprise environments, are being abused to gain unauthorized access, allowing attackers to infiltrate organizations across sectors such as healthcare, government, and managed service providers. The […]
Meta has announced plans to discontinue end-to-end encryption for Instagram’s direct messaging feature, marking a significant shift in its approach to user privacy and security. The change is set to take effect on May 8, 2026, effectively ending a feature that ensured only the sender and recipient could read messages. By removing this protection, conversations […]
Security researchers have identified serious vulnerabilities in Anthropic’s Claude Code tool that could expose developers to major cyber risks, including stolen data and full system compromise. The flaws stem largely from how the AI-powered coding assistant interacts with configuration files and external project environments, which attackers can manipulate to execute malicious actions. In some cases, […]
Cybersecurity researchers have discovered a new phishing toolkit called Starkiller that helps cybercriminals steal account information by imitating real login pages. The toolkit tricks victims into thinking they are signing in to legitimate websites such as email or online services. Instead of using a simple fake page, the tool loads the real website and secretly […]
Security researchers have discovered a powerful iPhone hacking toolkit that may be used by espionage groups and cybercriminals. The toolkit, known as Coruna, contains several exploit chains capable of targeting older versions of Apple’s iOS operating system. Researchers found that the framework can identify the type of iPhone and operating system being used, then deliver […]
Microsoft has warned about a phishing campaign that primarily targets government and public-sector organizations by abusing the redirection feature in OAuth authentication. OAuth is widely used to allow users to log in to websites or applications using existing accounts without sharing their passwords. In this campaign, attackers exploit the legitimate redirect function within the OAuth […]
A recent wave of hacktivist activity has resulted in 149 distributed denial-of-service (DDoS) attacks targeting 110 organizations in 16 different countries. The attacks occurred during a period of heightened geopolitical tension following a coordinated military campaign involving the United States and Israel against Iran. Cybersecurity researchers observed that the attacks were largely politically motivated and […]
A recent cybersecurity study has revealed serious vulnerabilities in several widely used cloud-based password managers, showing that many of the built-in recovery mechanisms can be exploited by attackers under certain conditions. The research found that popular services such as Bitwarden, Dashlane, and LastPass are susceptible to a range of password recovery attacks that could compromise […]
The U.S. Department of Defense is engaged in a tense dispute with AI company Anthropic over how its Claude artificial intelligence should be used by the military. The conflict centers on differing views about acceptable applications of AI in sensitive defense contexts. The Pentagon has been pushing major AI firms to allow their technologies to […]





