11 posts were published in the last hour 12:33 : Millions of Customer Records Stolen in Cyberattack on Gucci, Balenciaga, and Alexander McQueen 12:19 : Ukrainian Fugitive Added to EU Most Wanted List for LockerGoga Ransomware 12:19 : I did…
Threat Actors and Code Assistants: The Hidden Risks of Backdoor Injections
AI code assistants integrated into IDEs, like GitHub Copilot, offer powerful chat, auto-completion, and test-generation features. However, threat actors and careless users can exploit these capabilities to inject backdoors, leak sensitive data, and produce harmful code. Indirect prompt injection attacks…
Calm’s new Sleep app gives you a personal bedtime plan to help you rest better – plus earbuds
The new Calm x Ozlo Sleepbuds will play ‘sleep stories’ and soundscapes, and they’ll come with a free year of Calm Sleep. This article has been indexed from Latest news Read the original article: Calm’s new Sleep app gives you…
North Korean Hackers Weaponize ChatGPT in AI-Driven Phishing Attack
North Korea’s Kimsuky hackers used ChatGPT to forge government IDs in a phishing attack, marking a new era of AI-powered cyber warfare. The post North Korean Hackers Weaponize ChatGPT in AI-Driven Phishing Attack appeared first on eSecurity Planet. This article…
New APT28 Attack Via Signal Messenger Delivers BeardShell and Covenant Malware
Late in the summer of 2025, cybersecurity researchers uncovered a sophisticated spearphishing campaign targeting Ukrainian military personnel via the Signal messaging platform. The operation, dubbed “Phantom Net Voxel,” begins with a malicious Office document sent through private Signal chats, masquerading…
LG WebOS TV Vulnerability Let Attackers Bypass Authentication and Enable Full Device Takeover
A critical vulnerability has been discovered in LG’s WebOS for smart TVs, allowing an attacker on the same local network to bypass authentication mechanisms and achieve full control over the device. The flaw, which affects models like the LG WebOS…
Eve Security Launches AI Platform to Secure AI Agent Interactions
Eve Security today made available an observability and policy enforcement platform that is designed to use artificial intelligence (AI) agents to ensure that other AI agents are not accessing IT resources without permission. Fresh off raising $3 million in seed…
Vulnerability Summary for the Week of September 8, 2025
High Vulnerabilities PrimaryVendor — Product Description Published CVSS Score Source Info Adobe–Acrobat Reader Acrobat Reader versions 24.001.30254, 20.005.30774, 25.001.20672 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of…
Digital.ai brings expert-level cryptography to any developer team
Digital.ai released its App Sec White-box Cryptography Agent to simplify application security for developers and help customers ensure that every application requiring protection is secured. The Agent makes white-box cryptography, long considered an expert-only discipline, accessible to any development team,…
New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site
Cybersecurity researchers have warned of a new campaign that’s leveraging a variant of the FileFix social engineering tactic to deliver the StealC information stealer malware. “The observed campaign uses a highly convincing, multilingual phishing site (e.g., fake Facebook Security page),…
Hackers Hit Gucci And Balenciaga Data
Luxury conglomerate Kering has confirmed a significant data breach affecting millions of customers of its major brands, including Gucci, Balenciaga The post Hackers Hit Gucci And Balenciaga Data first appeared on CyberMaterial. This article has been indexed from CyberMaterial Read…
Fake Account Found In Google Portal
A hacking group named “Scattered Lapsus$ Hunters” claimed on Telegram to have successfully breached Google’s Law Enforcement Request System (LERS) The post Fake Account Found In Google Portal first appeared on CyberMaterial. This article has been indexed from CyberMaterial Read…
WhiteCobra Drops Malicious VSCode Apps
A recent and ongoing threat campaign from a group called WhiteCobra has been targeting users of popular code editors like VSCode, Cursor, and Windsurf The post WhiteCobra Drops Malicious VSCode Apps first appeared on CyberMaterial. This article has been indexed…
VoidProxy Targets Microsoft And Google
A sophisticated new phishing-as-a-service (PhaaS) platform, named VoidProxy, is actively targeting Microsoft 365 and Google accounts. The post VoidProxy Targets Microsoft And Google first appeared on CyberMaterial. This article has been indexed from CyberMaterial Read the original article: VoidProxy Targets…
Silent Push Raises $10 Million
Silent Push, a threat intelligence company based in Virginia, just announced that it has successfully raised $10 million in Series B funding. The post Silent Push Raises $10 Million first appeared on CyberMaterial. This article has been indexed from CyberMaterial…
FinWise Data Breach: 700K Customer Records Accessed by Ex-Employee
A major data breach at American First Finance, LLC has exposed sensitive information for nearly 700,000 customers. The breach, which occurred on May 31, 2024, was discovered over a year later on June 18, 2025. An ex-employee of the financial…
CrowdStrike npm Packages Hit by Supply Chain Attack
A new supply chain attack has compromised multiple npm packages maintained by the crowdstrike-publisher account, marking a worrying continuation of the so-called “Shai-Halud attack.” Developers and organizations using these packages should take immediate action to safeguard credentials and prevent unauthorized…
APT28 Exploits Signal Messenger to Deploy eardShell and Covenant Malware
Sekoia.io’s Threat Detection and Response (TDR) team has uncovered a sophisticated campaign by APT28 that weaponizes Signal Messenger to deploy two previously undocumented malware families—BeardShell and the Covenant framework. In early 2025, a trusted partner supplied samples that did not…
LG WebOS TV Vulnerability Enables Full Device Takeover by Bypassing Authentication
A security vulnerability has been discovered in LG WebOS TV systems that allows attackers to gain complete control over affected devices by bypassing authentication mechanisms. The vulnerability, disclosed during the TyphoonPWN 2025 LG Category competition where it won first place,…
Check Point and Nutanix Advance Cloud Network Security
As hybrid cloud environments grow in popularity and AI-driven threats become more sophisticated, organizations are under increasing pressure to enhance their security posture without adding operational overhead. We’re excited to report a significant step forward in this mission: Check Point…
T-Mobile will give you a free iPhone 17 Pro – here’s how to qualify
At T-Mobile, you can get the all-new iPhone 17 Pro for free when you sign up for or switch to the Experience Beyond mobile plan and use a qualifying trade-in. This article has been indexed from Latest news Read the…
Google’s new open protocol secures AI agent transactions – and 60 companies already support it
The Agent Payments Protocol aims to help consumers and businesses finally trust AI-enabled payments. This article has been indexed from Latest news Read the original article: Google’s new open protocol secures AI agent transactions – and 60 companies already support…
Roku’s first TV projector gives you a 150-inch screen – for less than $200
The Roku TV Smart Projector D1R Cube offers 1080p HD, 330 ANSI lumens, and dual 5W speakers, plus support for other Roku speakers. This article has been indexed from Latest news Read the original article: Roku’s first TV projector gives…
Digital Transformation Failures: A National Security Crisis in the Making
In the hyperconnected world, digital transformation has become synonymous with progress, efficiency and innovation. For governments, business and defense organizations alike, the ability to leverage the power of digital technologies… The post Digital Transformation Failures: A National Security Crisis in…