‘Sploitlight’ Vulnerability: How Hackers Bypassed Apple’s TCC Protections

Unpatched Apple devices remain exposed to Sploitlight, a macOS flaw that allows unauthorized access to private user data despite security measures. Read more »

Google Cloud: Threat Actors Increasingly Target Backups – Take These Steps Now

Defensive strategy best practices are included in Google’s latest cloud security report. Read more »

Microsoft Authenticator Users: Your Passwords Could Be Inaccessible Soon – Act By Aug. 1

If you use Microsoft Authenticator, there are important steps you might want to take this month when it comes to password management. Get the details. Read more »

Europe’s General-Purpose AI Rulebook: What’s Covered & Which Tech Giants Will Sign It

The EU’s General-Purpose AI Code of Practice is intended to guide AI developers in complying with the EU AI Act. Read more »

The $30M Cybersecurity AI — And Why Experts Say It Could Fail Spectacularly

Prophet Security has raised $30 million to deploy autonomous AI defenders. But experts warn that fully autonomous security operations are a dangerous myth that could leave companies more vulnerable... Read more »

Emergency Response to Cyberattack in Minnesota Now Includes National Guard

In response to a cyberattack, Minnesota Governor Tim Walz issued an emergency executive order bringing National Guard soldiers to active duty. Read more »

Vibe Coding Platform’s Vulnerability Could Have Affected Every App Built On It

Base44’s parent company Wix quickly patched the critical vulnerability. Researchers noted that vibe coding on a platform like Base44 can enlarge an app’s attack surface. Read more »

IBM Report: Shadow AI and Poor Governance Linked to Costlier Breaches in 2025

Only 34% of organizations with AI governance audit for misuse, IBM’s 2025 breach report warns. Lack of oversight is raising risks and costs. Read more »

Apple Patches Zero-Day Exploit Targeting Google Chrome Users

A zero-day exploit targeted Google Chrome users has been patched by Apple. Their latest updates target a variety of devices and operating systems. Read more »

Google Patches Vulnerability That Let Anyone Hide Search Results

Google’s Refresh Outdated Content tool was exploited to de-index a press article, exposing a flaw that allowed attackers to suppress valid web content. Read more »
Subscribe to our Newsletter