'BlueHammer' Windows zero-day exploit signals Microsoft bug disclosure issues
A researcher, citing a dispute with Microsoft, released a zero-day exploit for Windows that allows for full system takeover, highlighting ongoing tens
Apple Intelligence AI guardrails bypassed in new attack
Researchers from Luta Security have successfully bypassed Apple Intelligence's AI guardrails using a novel prompt injection technique called "Neural E
Bitter-linked hack-for-hire group expands espionage campaign to MENA journalists
A joint investigation reveals that the Bitter APT group, with suspected ties to India, has expanded its operations, targeting journalists and activist
A fragile ceasefire won't halt Iran-linked cyberattacks
A fragile ceasefire on the physical battlefield is unlikely to stop Iran-linked hackers, who see digital warfare as a persistent, ingrained part of co
Critical vulnerability in Ninja Forms exposes over a million WordPress sites
A critical flaw in the popular Ninja Forms WordPress plugin allows unauthenticated attackers to upload malicious files, leading to full site compromis
‘GrafanaGhost’ bypasses Grafana’s AI defenses without leaving a trace
Researchers discovered a flaw in Grafana's AI that lets attackers steal corporate data by hiding commands in dashboards, turning the AI into a spy.
The anatomy of a non-leak: How a public Orbán quote became a cybersecurity myth
A viral story claimed a 'leaked call' exposed a Hungarian leader's comments. The truth? It was a public interview. A case study in misinformation.
FBI and Pentagon warn of Iranian hackers targeting U.S. operational technology
A joint federal advisory warns that Iranian hackers are targeting U.S. water and energy sectors by exploiting default passwords on operational technol
Iran-linked hackers disrupt US critical infrastructure via PLC attacks
A federal warning highlights how an Iran-linked group exploited default passwords on industrial controllers to disrupt a US water utility, a stark rem
Predatory Sparrow claims attack on Iranian oil refinery amid escalating cyber conflict
A deep-dive analysis of the cyberattack on Iran's Lavan oil refinery, claimed by the Predatory Sparrow hacking group, and its geopolitical implication
TikTok dismantles covert influence networks targeting Hungarian elections
TikTok removed covert networks using fake accounts to amplify political attacks against both the government and opposition ahead of Hungary's election
The remediation crisis: why HackerOne is rethinking bug bounties in the age of AI
AI tools are finding bugs faster than open source projects can fix them, creating a remediation crisis that is forcing bug bounty platforms like Hacke











