Tea, a women-only dating safety app that allows users to review and share information about men they’ve dated anonymously, has suffered a significant data breach that exposed approximately 72,000 user images, including 13,000 sensitive selfies and photo identification documents submitted…
Threat Actors Claim Breach of Airpay Payment Gateway
Cybercriminals have reportedly claimed a successful breach of Airpay, an Indian payment gateway service, raising serious concerns about the security of financial data and customer information. The allegations surfaced on underground forums where threat actors are allegedly offering access to…
400,000 WordPress Websites Exposed by Post SMTP Plugin Vulnerability
A critical security vulnerability has been discovered in the popular Post SMTP plugin for WordPress, potentially exposing over 400,000 websites to account takeover attacks. The vulnerability, tracked as CVE-2025-24000, affects versions 3.2.0 and below of the plugin, allowing even low-privileged…
BlackSuit Ransomware Group Transitioning to ‘Chaos’ Amid Leak Site Seizure
The emerging Chaos ransomware appears to be a rebranding of BlackSuit, which had its leak site seized by law enforcement. The post BlackSuit Ransomware Group Transitioning to ‘Chaos’ Amid Leak Site Seizure appeared first on SecurityWeek. This article has been…
US Marine AI Start-Up Raises First External Funding
Following US Navy contract, start-up Spear AI raises $2.3m in funding to double headcount as it applies AI to subsea acoustic data This article has been indexed from Silicon UK Read the original article: US Marine AI Start-Up Raises First…
Tesla Plans San Francisco Robotaxi Launch This Weekend
Tesla chief executive reportedly tells staff Robotaxi service to launch as soon as this weekend, as company looks to offset declining sales This article has been indexed from Silicon UK Read the original article: Tesla Plans San Francisco Robotaxi Launch…
JD.com In Advanced Talks To Buy German Electronics Chain
Chinese e-commerce giant JD.com in advanced talks to buy German retail chain operator Ceconomy as it seeks European expansion This article has been indexed from Silicon UK Read the original article: JD.com In Advanced Talks To Buy German Electronics Chain
Malicious ISO File Used in Romance Scam Targeting German Speakers
Sublime Security reveals a cunning romance/adult-themed scam targeting German speakers, leveraging Keitaro TDS to deliver an AutoIT-based malware loader. Learn how this sophisticated campaign operates, its deceptive tactics, and the hidden payload. This article has been indexed from Hackread –…
Hackers Compromise Intelligence Website Used by CIA and Other Agencies
Unidentified hackers have successfully breached a critical intelligence website used by the CIA and other U.S. agencies to manage sensitive government contracts, according to the National Reconnaissance Office (NRO), the spy satellite service that operates the compromised platform. The cyberattack…
12 Best Infrastructure Monitoring Tools in 2025
Infrastructure monitoring tools are critical for ensuring IT infrastructure’s optimal performance, availability, and security. These tools provide comprehensive visibility into the health and status of various infrastructure components, including servers, networks, storage systems, and applications. Infrastructure monitoring tools help detect…
Hackers Breach Intelligence Portal Used by the CIA and Other Agencies
Unidentified hackers have successfully compromised a critical intelligence website operated by the National Reconnaissance Office, marking a significant security breach affecting the CIA and multiple government agencies. The attack targeted the Acquisition Research Center website, which serves as a crucial…
This 16-inch Acer is a full-package value pick I’d happily replace my main laptop with
Acer’s Swift 16 AI combines a sleek build with a gorgeous display and fantastic battery life for a very competitive $1,250. This article has been indexed from Latest news Read the original article: This 16-inch Acer is a full-package value…
Considering Samsung’s new Z Flip 7? Why I recommend waiting for next year’s model
The Galaxy Z Flip 7 is Samsung’s best clamshell foldable to date, but evidence suggests it’s cooking up something big for next year. This article has been indexed from Latest news Read the original article: Considering Samsung’s new Z Flip…
China-linked group Fire Ant exploits VMware and F5 flaws since early 2025
China-linked group Fire Ant exploits VMware and F5 flaws to stealthily breach secure systems, reports cybersecurity firm Sygnia. China-linked cyberespionage group Fire Ant is exploiting VMware and F5 vulnerabilities to stealthily access secure, segmented systems, according to Sygnia. Since early…
10 Best Cloud Monitoring Tools in 2025
Cloud monitoring tools are essential for maintaining cloud-based services and applications’ performance, availability, and security. These tools provide real-time visibility into cloud infrastructure, enabling monitoring metrics such as resource utilization, application performance, and network traffic. Cloud monitoring tools help identify…
LG Innotek Camera Vulnerabilities Let Attackers Gain Administrative Access
A serious security vulnerability has been discovered in LG Innotek’s LNV5110R camera model that could allow cybercriminals to gain complete administrative control over affected devices. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued an advisory on July 24, 2025,…
US Woman Gets Eight Years for Part in $17m North Korean Scheme
Arizonan woman sentenced to 102 months for operating laptop farm for North Korean IT workers This article has been indexed from www.infosecurity-magazine.com Read the original article: US Woman Gets Eight Years for Part in $17m North Korean Scheme
ByteDance Shows Robot Carrying Out Household Tasks
TikTok parent ByteDance demonstrates robot paired with large-scale AI model that can follow natural-language promts to carry out tasks This article has been indexed from Silicon UK Read the original article: ByteDance Shows Robot Carrying Out Household Tasks
CMA Says Apple, Google Form ‘Effective Duopoly’
UK competition regulator proposes giving Apple, Google ‘strategic market status’ designation to open up competition, user choice This article has been indexed from Silicon UK Read the original article: CMA Says Apple, Google Form ‘Effective Duopoly’
Augmented Empathy: How AI is Redefining Human-Centric CX (Part 1)
Explore how AI is powering emotion-aware CX, enabling hyper-personalisation, and supporting humans to create more empathetic customer experiences. This article has been indexed from Silicon UK Read the original article: Augmented Empathy: How AI is Redefining Human-Centric CX (Part 1)
Microsoft Says China-Backed Groups Behind SharePoint Hacks
At least two of the groups targeting unpatched SharePoint flaws are backed by Chinese government, Microsoft says This article has been indexed from Silicon UK Read the original article: Microsoft Says China-Backed Groups Behind SharePoint Hacks
Intel Shares Plunge Over Foundry Woes
Intel shares sink after it details cost-cutting measures, as it lays off 15 percent of workforce and seeks customers for foundry business This article has been indexed from Silicon UK Read the original article: Intel Shares Plunge Over Foundry Woes
Flaw Allowing Website Takeover Found in WordPress Plugin With 400k Installations
The Post SMTP email delivery WordPress plugin is affected by a critical vulnerability and half of websites using it remain unpatched. The post Flaw Allowing Website Takeover Found in WordPress Plugin With 400k Installations appeared first on SecurityWeek. This article…
Dating App Breach Exposes Images of 13,000 Women
Dating app Tea has been compromised by a hacker, resulting in the exposure of 13,000 selfies This article has been indexed from www.infosecurity-magazine.com Read the original article: Dating App Breach Exposes Images of 13,000 Women