
ESET specialists have discovered an unusual piece of malware dubbed PromptLock. The researchers describe it as the first known ransomware to use AI.
Read full article →📟 News
Date: 28/08/2025
ESET specialists have discovered an unusual piece of malware dubbed PromptLock. The researchers describe it as the first known ransomware to use AI.
Read full article →📟 News
Date: 28/08/2025
The French retail chain Auchan has notified hundreds of thousands of customers that their personal data was stolen during a cyberattack.
Read full article →📟 News
Date: 28/08/2025
Experts at Trail of Bits have developed a new type of attack that enables the theft of user data by embedding malicious prompts into images, invisible to the human eye.
Read full article →📟 News
Date: 27/08/2025
Google representatives announced that starting in 2026, only apps from verified developers can be installed on certified Android devices. This measure is aimed at combating malware and financial fraud, and will apply to apps installed from third-party sources.
Read full article →📟 News
Date: 27/08/2025
A critical vulnerability in the desktop version of Docker for Windows and macOS made it possible to compromise the host system by running a malicious container, even when Enhanced Container Isolation (ECI) was enabled.
Read full article →📟 News
Date: 27/08/2025
Researchers at Zscaler discovered that 77 malicious Android applications, with more than 19 million installs in total, were distributing various malware families on the official Google Play store.
Read full article →📟 News
Date: 26/08/2025
55-year-old Davis Lu received four years in prison for sabotaging his former employer’s Windows network. Lu carried out his revenge using custom malware and a special “kill switch” that locked out all employees after his account was disabled.
Read full article →📟 News
Date: 26/08/2025
Researchers at Positive Technologies reported the discovery of a previously unknown toolkit used by the Goffee hacker group (aka Paper Werewolf). It was employed in the later stages of attacks and allowed the attackers to remain undetected within victims’ infrastructure for a long time.
Read full article →📟 News
Date: 26/08/2025
The topic of hacking and stealing cars using the Flipper Zero has once again made headlines in the global media. This time, hackers claim to be selling “secret firmware” for the gadget that supposedly can be used against Ford, Audi, Volkswagen, Subaru, Hyundai, Kia, and a number of other brands. The Flipper developers explain that this is not true.
Read full article →📟 News
Date: 23/08/2025
The U.S. Department of Justice has charged the alleged developer and administrator of the RapperBot DDoS botnet, which was rented out to cybercriminals. The botnet itself was seized by law enforcement in early August as part of Operation PowerOff.
Read full article →📟 News
Date: 23/08/2025
The maintainers of the PyPI (Python Package Index) repository announced that they will now be countering domain-resurrection attacks, which allow attackers to take over other users’ accounts via password resets.
Read full article →📟 News
Date: 23/08/2025
Users report that recent updates to Windows 11 24H2 may cause data corruption and failures in some SSD and HDD models. Microsoft has not yet been able to reproduce the issue and is asking people to submit information about any problems they’ve identified.
Read full article →📟 News
Date: 23/08/2025
The UAE-based company Advanced Security Solutions, which launched this month, offers up to $20 million for zero-day vulnerabilities and exploits that would allow hacking any smartphone via a text message. This is among the highest prices of any vulnerability broker, at least among those that disclose such figures publicly.
Read full article →📟 News
Date: 23/08/2025
Researchers at Koi Security warn that the behavior of the popular Chrome extension FreeVPN.One has recently changed. It has begun secretly taking screenshots of users’ activity and sending them to a remote server.
Read full article →📟 News
Date: 22/08/2025
Researchers from the Great Firewall Report team reported that on the night of August 20 there was either a malfunction or some kind of test underway in the operation of the Great Firewall. All traffic on TCP port 443 was blocked for 74 minutes, effectively cutting China off from most of the global internet.
Read full article →📟 News
Date: 22/08/2025
Apple has released out-of-band patches to fix a zero-day vulnerability. The new issue has reportedly already been exploited as part of an “extremely sophisticated attack.”
Read full article →📟 News
Date: 22/08/2025
Guardio researchers tested a browser with an AI agent and concluded that it is vulnerable to both old and new attack techniques that can coerce it into interacting with malicious pages and prompts.
Read full article →📟 News
Date: 22/08/2025
The new RAT is distributed via malicious .scr files disguised as financial documents. Until March 2025, the attackers sent them through Skype, but after it was shut down they switched to other channels.
Read full article →📟 News
Date: 22/08/2025
Citizen Lab analysts warned that more than 20 VPN apps on the Google Play store have serious security issues that threaten users’ privacy and allow transmitted data to be decrypted. In total, these apps account for 972 million downloads.
Read full article →📟 News
Date: 21/08/2025
Researchers from Red Canary report that hackers are using a new Linux malware called DripDropper. For these attacks, the criminals exploit a critical vulnerability in the open-source Apache ActiveMQ software and then patch the bug they exploited.
Read full article →