Salesloft announced that on September 5 it will temporarily disable its AI chatbot, Drift, after numerous companies were affected by a large-scale supply-chain attack targeting it. The incident resulted in the mass theft of authentication tokens.
CONTINUE READING 🡒 A hacker attack disrupted Bridgestone’s operations
The Japanese corporation Bridgestone reports that it is investigating a cyberattack that affected the operations of some of its manufacturing facilities in North America.
CONTINUE READING 🡒 Apitor Technology toys transmitted children’s geolocation data to China
The U.S. Department of Justice filed a lawsuit against toy manufacturer Apitor Technology. U.S. authorities believe the company allowed a third party from China to collect children’s geolocation data without their knowledge and without parental consent.
CONTINUE READING 🡒 How Digital Audio Encoding Works: Sampling, Quantization, Bitrate, and Codecs
Ever wondered how digital devices play back sound? How a stream of ones and zeros becomes an audible signal? If you’ve started reading, you probably have. In this article, you’ll learn how different audio formats came about,…
CONTINUE READING 🡒 August Windows updates may block app installations
Microsoft reported that the Windows security updates for August 2025 may trigger unexpected User Account Control (UAC) prompts and cause problems with app installations. The bug affects users without administrator privileges across all supported versions of Windows.
CONTINUE READING 🡒 Hackers Are Using the HexStrike AI Tool to Exploit Newly…
Check Point analysts warned that attackers are using the new HexStrike AI framework, designed for offensive cybersecurity, to exploit recent n-day vulnerabilities in real-world attacks.
CONTINUE READING 🡒 Firewall Level 2: Configuring a MikroTik Router to Block Common…
In this article, we’ll cover how to harden a MikroTik router against attacks and port scans, and how to keep your network off blocklists. The techniques you learn here will also help you configure other types of…
CONTINUE READING 🡒 Grok is being used to spread malicious links on X
Guardio Labs analysts have observed that attackers are using Grok, the AI assistant integrated into the social network X, to circumvent link-posting restrictions that the platform has implemented to combat malicious advertising.
CONTINUE READING 🡒 Researcher finds a way to hack Chinese Pudu service robots
An independent cybersecurity researcher known as BobDaHacker discovered security issues in Pudu Robotics (a leading global supplier of commercial service robots). The vulnerabilities allowed attackers to redirect the robots to any location and force them to execute…
CONTINUE READING 🡒 Supercharge Nmap: Advanced Penetration Testing with Firewall Evasion, Dirbusting, DoS…
Nmap is the gold standard among port scanners and one of a pentester’s most important tools. But can you honestly say you’ve mastered all its features and use cases? In this article, you’ll learn how to use…
CONTINUE READING 🡒 Google patched 120 Android vulnerabilities, including two 0-days
Google developers released security updates for Android that fixed 120 vulnerabilities in the operating system. According to the company, two of the issues had already been exploited by attackers in targeted campaigns.
CONTINUE READING 🡒 Hackers abuse the Velociraptor forensics tool
Sophos cybersecurity specialists have highlighted a cyberattack in which unidentified threat actors used the open-source forensic tool for endpoint monitoring Velociraptor.
CONTINUE READING 🡒 Decoding Ping, Traceroute, and WHOIS Output for Effective Network Troubleshooting
Ping, traceroute, and whois are among the first tools new admins learn. Many people who aren’t network specialists stop there—and that’s a mistake. With the standard toolset you can pull far more information about a problem than…
CONTINUE READING 🡒 Cyberattack disrupts Jaguar Land Rover production
Automaker Jaguar Land Rover (JLR) announced that it was forced to take a number of systems offline due to a cyberattack. The incident appears to have affected the automaker’s manufacturing and retail operations.
CONTINUE READING 🡒 Why Smartphone Home Screens Are Broken—and Why I Built AIO…
I don’t know about you, but I’ve always found it odd that a powerful smartphone—connecting people to each other and to the rest of the world—uses an utterly useless, uninformative screen of icons as its primary interface.…
CONTINUE READING 🡒 Cloudflare blocked the largest-ever DDoS attack — 11.5 Tbps
The record for DDoS attack power set in June 2025 has already been broken. Cloudflare announced that it recently blocked the largest DDoS attack on record, whose peak bandwidth reached 11.5 Tbps.
CONTINUE READING 🡒 Google Didn’t Ask 2.5 Billion Gmail Users to Change Passwords
Last week, media reports claimed that Google was allegedly notifying all Gmail users (about 2.5 billion people) en masse to urgently change their passwords and enable two-factor authentication. Google representatives say that reports of security issues in…
CONTINUE READING 🡒 Wardriving Hardware Guide: Building a Wi‑Fi Pentesting Toolkit with USB…
Wardriving—essentially Wi‑Fi traffic capture—always starts with choosing the right hardware. That’s exactly what we’ll do: in a handy Q&A, we’ll break down what devices are out there, which tasks they’re best suited for, and what to pick…
CONTINUE READING 🡒 FreePBX Servers Under Attack Due to a 0-Day Vulnerability
Developers at Sangoma Technologies Corporation have warned about an actively exploited 0-day vulnerability in FreePBX that affects systems with the administration panel exposed to the internet.
CONTINUE READING 🡒 Bug in VS Code allows reuse of deleted extension names
Researchers have discovered an issue in the Visual Studio Code Marketplace that allowed attackers to reuse the names of previously deleted extensions.
CONTINUE READING 🡒