News
Supply chain attacks now fuel a 'self-reinforcing' cybercrime economy
Cybercriminals are turning supply chain attacks into an industrial-scale operation, linking breaches, credential theft, and ransomware into a "self-reinforcing" ecosystem, researchers say.…
Feeling brave? Ministry of Defence seeks £300K digital boss to manage £4.6B spend
The UK Ministry of Defence (MoD) is offering between £270,000 to £300,000 for a senior digital leader who will oversee more than £4.6 billion in spending and more than 3,000 specialist staff.…
Google: China's APT31 used Gemini to plan cyberattacks against US orgs
A Chinese government hacking group that has been sanctioned for targeting America's critical infrastructure used Google's AI chatbot, Gemini, to auto-analyze vulnerabilities and plan cyberattacks against US organizations, the company says.…
Microsoft warns that poisoned AI buttons and links may betray your trust
Amid its ongoing promotion of AI’s wonders, Microsoft has warned customers it has found many instances of a technique that manipulates the technology to produce biased advice.…
Devilish devs spawn 287 Chrome extensions to flog your browser history to data brokers
They know where you've been and they're going to share it. A security researcher has identified 287 Chrome extensions that allegedly exfiltrate browsing history data for an estimated 37.4 million installations.…
Posting AI-generated caricatures on social media is risky, infosec killjoys warn
If you've seen the viral AI work pic trend where people are asking ChatGPT to "create a caricature of me and my job based on everything you know about me" and sharing it to social, you might think it's harmless. You'd be wrong.…
Were telcos tipped off to *that* ancient Telnet bug? Cyber pros say the signs stack up
Telcos likely received advance warning about January's critical Telnet vulnerability before its public disclosure, according to threat intelligence biz GreyNoise.…
Payroll pirates are conning help desks to steal workers' identities and redirect paychecks
Exclusive When fraudsters go after people's paychecks, "every employee on earth becomes a target," according to Binary Defense security sleuth John Dwyer.…
Notepad's new Markdown powers served with a side of remote code execution
Just months after Microsoft added Markdown support to Notepad, researchers have found the feature can be abused to achieve remote code execution (RCE).…
Legacy systems blamed as ministers promise no repeat of Afghan breach
Legacy IT issues are hampering key technical measures designed to prevent highly sensitive data leaks, UK government officials say.…
Microsoft's Valentine's gift to admins: 6 exploited zero-day fixes
What better way to say I love you than with an update? Attackers exploited a whopping six Microsoft bugs as zero-days prior to Redmond releasing software fixes on February's Patch Tuesday.…
AI agents spill secrets just by previewing malicious links
AI agents can shop for you, program for you, and, if you're feeling bold, chat for you in a messaging app. But beware: attackers can use malicious prompts in chat to trick an AI agent into generating a data-leaking URL, which link previews may fetch automatically.…
Singapore spent 11 months booting China-linked snoops out of telco networks
Singapore spent almost a year flushing a suspected China-linked espionage crew out of its telecom networks in what officials describe as the country's largest cyber defense operation to date.…
Nearly 17,000 Volvo staff dinged in supplier breach
Nearly 17,000 Volvo employees had their personal data exposed after cybercriminals breached Conduent, an outsourcing giant that handles workforce benefits and back-office services.…
British Army splashes $86M on AI gear to speed up the battlefield kill chain
British soldiers are to get an array of AI-ready kit that should mean they don't have to wait to see the "whites of their eyes" before pulling the trigger.…
Someone's attacking SolarWinds WHD to steal high‑privilege credentials - but we don't know who or how
Digital intruders exploited buggy SolarWinds Web Help Desk (WHD) instances in December to break into victims' IT environments, move laterally, and steal high-privilege credentials, according to Microsoft researchers.…
More than 135,000 OpenClaw instances exposed to internet in latest vibe-coded disaster
It's a day with a name ending in Y, so you know what that means: Another OpenClaw cybersecurity disaster.…
Dutch data watchdog snitches on itself after getting caught in Ivanti zero-day attacks
The Dutch Data Protection Authority (AP) says it was one of the many organizations popped when attackers raced to exploit recent Ivanti vulnerabilities as zero-days.…
Taiwan tells Uncle Sam its chip ecosystem ain't going anywhere
Taiwan's vice-premier has ruled out relocating 40 percent of the country's semiconductor production to the US, calling the Trump administration's goal "impossible."…
How the GNU C Compiler became the Clippy of cryptography
FOSDEM 2026 The creators of security software have encountered an unlikely foe in their attempts to protect us: modern compilers.…