Category: EN

Modern Vulnerability Detection: Using GNNs to Find Subtle Bugs

For over 20 years, static application security testing (SAST) has been the foundation of secure coding. However, beneath the surface, many legacy SAST tools still operate using basic techniques such as regular expressions and lexical pattern matching; essentially, sophisticated versions…

Scam-checking just got easier: Malwarebytes is now in ChatGPT

Malwarebytes is now in ChatGPT, making it the first cybersecurity provider that can deliver novel expertise without ever leaving the chat. This article has been indexed from Malwarebytes Read the original article: Scam-checking just got easier: Malwarebytes is now in ChatGPT

Chinese Crime Networks Move Billions

In 2025, Chinese-language money laundering networks utilized cryptocurrency to move approximately 16.1 billion dollars in illegal funds, representing nearly twenty percent of all illicit digital asset activity. This article has been indexed from CyberMaterial Read the original article: Chinese Crime…

Apple Privacy Feature Limits Tracking

Apple is launching a privacy setting in iOS 26.3 that allows users to restrict cellular carriers from tracking their exact location through cell towers. This article has been indexed from CyberMaterial Read the original article: Apple Privacy Feature Limits Tracking

Iconics SCADA Vulnerability Can Render Systems Unbootable

Palo Alto Networks researchers identified an Iconics SCADA flaw that can render industrial systems unbootable. The post Iconics SCADA Vulnerability Can Render Systems Unbootable appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet Read the original…

How state-sponsored attackers hijacked Notepad++ updates

Suspected Chinese state-sponsored attackers hijacked the Notepad++ update mechanism by compromising the software project’s shared hosting server and intercepting and redirecting update traffic destined for notepad-plus-plus.org, the software’s maintainer Don Ho confirmed on Monday. The attack timeline In early December…

Securing the Mid-Market Across the Complete Threat Lifecycle

For mid-market organizations, cybersecurity is a constant balancing act. Proactive, preventative security measures are essential to protect an expanding attack surface. Combined with effective protection that blocks threats, they play a critical role in stopping cyberattacks before damage is done.…

Open Vsx Supply Chain Attack Spreads Glassworm

Cybersecurity researchers recently identified a supply chain attack on the Open VSX Registry where hackers hijacked a developer’s account to distribute malicious updates. This article has been indexed from CyberMaterial Read the original article: Open Vsx Supply Chain Attack Spreads…

Nationstates Confirms Breach Shuts Site

The browser-based government simulation game NationStates recently experienced a significant data breach after a vulnerability reporter accessed and copied sensitive information from its production server. This article has been indexed from CyberMaterial Read the original article: Nationstates Confirms Breach Shuts…

Crypto Investor Loses Millions To Scam

An Ethereum investor recently lost $12.4 million in a sophisticated address poisoning scam after accidentally sending funds to a fraudulent wallet that mimicked a frequent contact. This article has been indexed from CyberMaterial Read the original article: Crypto Investor Loses…

Cyberattacks Disrupt Polish Energy Sites

CERT Polska reported that a coordinated wave of cyberattacks on December 29, 2025, targeted more than thirty renewable energy sites, a manufacturer, and a major combined heat and power plant. This article has been indexed from CyberMaterial Read the original…

Arrests Trigger Scam Worker Exodus

Recent law enforcement actions against two major network leaders in Cambodia have triggered a massive release of thousands of laborers from illicit scam compounds. This article has been indexed from CyberMaterial Read the original article: Arrests Trigger Scam Worker Exodus