Category: Cyber News


  • Chinese Gov’t Fronts Trick the West to Obtain Cyber Tech

    Outwardly neutral Chinese institutions have been collaborating with Western orgs and researchers for the benefit of PRC state intelligence. ​ ​ ​Read More

  • New Report Links Research Firms BIETA and CIII to China’s MSS Cyber Operations

    A Chinese company named the Beijing Institute of Electronics Technology and Application (BIETA) has been assessed to be likely led by the Ministry of State Security (MSS). The assessment comes from evidence that at least four BIETA personnel have clear or possible links to MSS officers and their relationship with the University of International Relations,…

  • ⚡ Weekly Recap: Oracle 0-Day, BitLocker Bypass, VMScape, WhatsApp Worm & More

    The cyber world never hits pause, and staying alert matters more than ever. Every week brings new tricks, smarter attacks, and fresh lessons from the field. This recap cuts through the noise to share what really matters—key trends, warning signs, and stories shaping today’s security landscape. Whether you’re defending systems or just keeping up, these…

  • 5 Critical Questions For Adopting an AI Security Solution

    In the era of rapidly advancing artificial intelligence (AI) and cloud technologies, organizations are increasingly implementing security measures to protect sensitive data and ensure regulatory compliance. Among these measures, AI-SPM (AI Security Posture Management) solutions have gained traction to secure AI pipelines, sensitive data assets, and the overall AI ecosystem. These solutions help ​ ​…

  • CometJacking: One Click Can Turn Perplexity’s Comet AI Browser Into a Data Thief

    Cybersecurity researchers have disclosed details of a new attack called CometJacking targeting Perplexity’s agentic AI browser Comet by embedding malicious prompts within a seemingly innocuous link to siphon sensitive data, including from connected services, like email and calendar. The sneaky prompt injection attack plays out in the form of a malicious link that, when clicked,…

  • Scanning Activity on Palo Alto Networks Portals Jump 500% in One Day

    Threat intelligence firm GreyNoise disclosed on Friday that it has observed a spike in scanning activity targeting Palo Alto Networks login portals. The company said it observed a nearly 500% increase in IP addresses scanning Palo Alto Networks login portals on October 3, 2025, the highest level recorded in the last three months. It described…

  • Scattered Lapsus$ Hunters Returns With Salesforce Leak Site

    After claiming it would shut down, the cybercriminal collective reemerged and threatened to publish the stolen data of Salesforce customers by Oct. 10 if its demands are not met. ​ ​ ​Read More

  • Dutch Authorities Arrest Two Teens for Alleged Pro-Russian Espionage

    Dutch Prime Minister Dick Schoof described the incident as part of a broader pattern of Russian hybrid attacks against Europe. ​ ​ ​Read More

  • Detour Dog Caught Running DNS-Powered Malware Factory for Strela Stealer

    A threat actor named Detour Dog has been outed as powering campaigns distributing an information stealer known as Strela Stealer. That’s according to findings from Infoblox, which found the threat actor to maintain control of domains hosting the first stage of the stealer, a backdoor called StarFish. The DNS threat intelligence firm said it has…

  • BCI: The Thing of Nightmare or Dreams?

    Brain computer interface technology looks to provide users with hands-free device control, but could security ever keep up with the risks? ​ ​ ​Read More