ScarCruft Uses Zoho WorkDrive and USB Malware to Breach Air-Gapped Networks

The North Korean threat actor known as ScarCruft has been attributed to a fresh set of tools, including a backdoor that uses Zoho WorkDrive for command-and-control (C2) communications to... Read more »

5 Nations Alert: Critical Cisco Bug Used in Global Espionage Campaign

Hackers exploited a critical Cisco SD-WAN flaw, prompting a rare joint warning from the US, UK, Australia, Canada, and New Zealand. The post 5 Nations Alert: Critical Cisco Bug... Read more »

Millions at Risk as Android Mental Health Apps Expose Sensitive Data

Oversecured flagged 1,575 flaws in 10 Android health apps with 14.7M installs, putting chats, CBT notes, and mood logs at risk, per BleepingComputer. The post Millions at Risk as... Read more »

IronCurtain: An open-source, safeguard layer for autonomous AI assistants

Veteran security engineer Niels Provos is working on a new technical approach designed to stop autonomous AI agents from taking actions you haven’t specifically authorized. His open-source software solution,... Read more »

Meta tightens grip on scam advertisers

Meta is stepping up the fight against scams on its platforms by filing multiple lawsuits targeting companies and individuals in Brazil, China, and Vietnam who used deceptive tactics to... Read more »

iPhone and iPad are the first consumer devices cleared for NATO ‘RESTRICTED’ classification

Apple’s iPhone and iPad are now NATO-approved for classified use, listed in the alliance’s Information Assurance Product Catalogue. Apple announced that its iPhone and iPad have received NATO approval... Read more »

Juniper issues emergency patch for critical PTX router RCE

Juniper released an emergency patch for Junos OS Evolved to fix CVE-2026-21902, a critical RCE flaw affecting PTX routers. Juniper Networks issued an out-of-band security update for Junos OS... Read more »

Android 17 second beta expands privacy controls for contacts, SMS and local networks

Google’s second beta of Android 17 continues updates to platform behavior and introduces new APIs focused on protecting sensitive data. Protecting contact and local network data A new system-level... Read more »

Europol goes after The Com’s ransomware and extortion networks

Law enforcement agencies across 28 countries have spent the past year building cases against a loosely organized collective known as The Com, a decentralized network of mostly teenagers and... Read more »

Microsoft brings ASUS and Dell into its Windows 365 Cloud PC strategy

Microsoft is adding two new Windows 365 Cloud PC devices, the ASUS NUC 16 for Windows 365 and the Dell Pro Desktop for Windows 365, expanding hardware options for... Read more »
Subscribe to our Newsletter