Microsoft has unveiled a new three-stage plan to phase out the legacy NT LAN Manager (NTLM) authentication protocol as part of its efforts to improve security in Windows environments. The move is aimed at reducing reliance on the decades-old technology and transitioning systems toward more secure, modern alternatives like Kerberos. Although NTLM has been deprecated […]
Notepad++, a popular open-source text editor used by millions of developers and IT professionals, recently revealed that its official update mechanism had been compromised by a highly skilled attacker linked to a nation-state. The incident did not involve malicious code being added directly to the Notepad++ software itself, but instead exploited weaknesses in the infrastructure […]
Cybersecurity investigators have discovered that a major security breach at the popular password manager LastPass in 2022 has continued to cause problems for users years later. When hackers broke into LastPass’s systems, they stole copies of encrypted password vaults — the secure folders where users keep passwords and other important information. Although these vaults were […]
Cybersecurity researchers have discovered that a well-known hacker group called Silver Fox is now targeting people in India with fake emails that appear to come from the income tax department. These emails are designed to trick users into downloading harmful software disguised as a legitimate file. Once a victim interacts with the fake file, the […]
The U.S. Federal Bureau of Investigation (FBI) has issued a warning about a sneaky new tactic used by North Korean hackers to target organizations and individuals. Instead of relying on traditional phishing emails with bad links, these attackers are embedding harmful web addresses inside QR codes. People are being encouraged to scan these QR codes, […]
Cybersecurity experts have discovered five harmful Google Chrome extensions that were pretending to be useful tools but were actually designed to steal access to work accounts. These extensions were made to look like tools for popular business systems used by companies for human resources and finance tasks. Because they appeared legitimate, users could easily install […]
Recently, security experts uncovered a major scam where attackers are using Google Cloud tools to send very convincing fake emails. These messages look like they come from a trusted Google address, which makes people more likely to open them without thinking twice. The scammers are taking advantage of a feature in Google Cloud that is […]
There is a new type of malware spreading online that is designed to steal Discord accounts and personal information. This threat, known as VVS Stealer, quietly infects computers and works in the background without the user realizing anything is wrong. Once someone accidentally downloads and opens this malware, it quickly installs itself on the computer […]
Microsoft is raising a big red flag for organizations about a stealthy cyber threat that takes advantage of misconfigured email systems to trick employees and IT teams alike. What makes this attack dangerous is how convincingly it mimics internal communication — delivering phishing emails that appear to come from within a company’s own domain, bypassing […]
In early 2026, a serious privacy issue came to light involving Chrome browser extensions that claimed to enhance access to AI tools like ChatGPT. These extensions appeared helpful on the surface, offering users quick ways to interact with AI assistants directly from their browser. However, behind the scenes, they were doing something far more dangerous. […]





