Lovense fixed bugs exposing emails and allowing account takeovers. Company CEO may take legal action after the flaws were publicly disclosed. Lovense, a manufacturer of internet-connected sex toys, fixed two vulnerabilities that exposed users’ emails and allowed remote account takeovers.…
Tag: EN
Every Reason Why I Hate AI and You Should Too
maybe it’s anti-innovation, maybe it’s just avoiding hype. But one thing is clear, I’m completely done with hearing about AI. This article has been indexed from MalwareTech Read the original article: Every Reason Why I Hate AI and You Should…
Gene Sequencing Giant Illumina Settles for $9.8M Over Product Vulnerabilities
Illumina will pay $9.8 million to settle accusations that products provided to the US government were affected by cybersecurity flaws. The post Gene Sequencing Giant Illumina Settles for $9.8M Over Product Vulnerabilities appeared first on SecurityWeek. This article has been…
Drone Leader DJI Launches First 360-Degree Camera
Leading drone maker DJI expands into fast-growing 360-degree camera market to compete with Insta360, as it faces US hostility This article has been indexed from Silicon UK Read the original article: Drone Leader DJI Launches First 360-Degree Camera
China’s ‘Instant Commerce’ Companies Call Truce On Price War
Alibaba, JD.com, Meituan say they will abide market regulator’s call for ‘rational’ competition after months of promotional excess This article has been indexed from Silicon UK Read the original article: China’s ‘Instant Commerce’ Companies Call Truce On Price War
APT37 Hackers Weaponizes JPEG Files to Attack Windows Systems Leveraging “mspaint.exe”
A sophisticated new wave of cyberattacks attributed to North Korea’s notorious APT37 (Reaper) group is leveraging advanced malware hidden within JPEG image files to compromise Microsoft Windows systems, signaling a dangerous evolution in evasion tactics and fileless attack techniques. Security…
Interlock Ransomware Employs ClickFix Technique to Run Malicious Commands on Windows Machines
The cybersecurity landscape continues to evolve as threat actors develop increasingly sophisticated methods to compromise Windows systems. A new ransomware variant known as Interlock has emerged as a significant threat, leveraging the deceptive ClickFix social engineering technique to execute malicious…
Microsoft PlayReady DRM Used by Netflix, Amazon, and Disney+ Leaked Online
A significant security breach has compromised Microsoft’s PlayReady Digital Rights Management (DRM) system, exposing critical certificates that protect premium streaming content across major platforms including Netflix, Amazon Prime Video, and Disney+. The leak, which surfaced on GitHub through an account…
A week in security (July 28 – August 3)
A list of topics we covered in the week of July 28 to August 3 of 2025 This article has been indexed from Malwarebytes Read the original article: A week in security (July 28 – August 3)
Augmented Empathy: Head-to-Head Interview
In today’s competitive landscape, delivering exceptional customer experiences (CX) means going beyond efficiency and convenience—it means connecting with customers on a deeply human level. Artificial Intelligence is no longer just an automation tool; it’s becoming a co-pilot for empathy, enabling…
PlayPraetor Android Trojan Infects 11,000+ Devices via Fake Google Play Pages and Meta Ads
Cybersecurity researchers have discovered a nascent Android remote access trojan (RAT) called PlayPraetor that has infected more than 11,000 devices, primarily across Portugal, Spain, France, Morocco, Peru, and Hong Kong. “The botnet’s rapid growth, which now exceeds 2,000 new infections…
#BHUSA: Cloud Intrusions Skyrocket in 2025
CrowdStrike revealed the surge in cloud intrusions was partly driven by a 40% increase in Chinese-state actors exploiting these environments This article has been indexed from www.infosecurity-magazine.com Read the original article: #BHUSA: Cloud Intrusions Skyrocket in 2025
Akira’s SonicWall zero-day, UK Legal-Aid suffers, Luxembourg 5G attack
Huge thanks to our sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and ransomware. ThreatLocker operates with a default deny approach to reduce the attack surface…
Cybersecurity Today: Hamilton’s Ransomware Crisis and Emerging AI and OAuth Threats
In this episode of ‘Cybersecurity Today,’ host David Chipley discusses several major security incidents and threats. Hamilton, Ontario faces a $5 million insurance denial following a ransomware attack due to incomplete deployment of Multi-Factor Authentication (MFA). The episode also highlights…
Augmented Empathy: How AI is Redefining Human-Centric CX (Part 2)
Discover how ethical AI, feedback loops, and human oversight are redefining trust and transparency in customer experience design. This article has been indexed from Silicon UK Read the original article: Augmented Empathy: How AI is Redefining Human-Centric CX (Part 2)
Nvidia Denies Chip Backdoors Amidst China Probe
Nvidia denies its AI chips contain backdoors that could allow remote control or tracking, as China’s cybersecurity regulator opens probe This article has been indexed from Silicon UK Read the original article: Nvidia Denies Chip Backdoors Amidst China Probe
Critical Squid Flaw Allows Remote Code Execution by Attackers
A severe security vulnerability in the widely-used Squid HTTP proxy has been disclosed, potentially exposing millions of systems to remote code execution attacks. The flaw, designated as CVE-2025-54574 and SQUID-2025:1, represents a critical buffer overflow vulnerability in the software’s URN…
China’s botched Great Firewall upgrade invites attacks on its censorship infrastructure
Attempts to censor QUIC traffic create chance to block access to offshore DNS resolvers China’s attempts to censor traffic carried using Quick UDP Internet Connections (QUIC) are imperfect and have left the country at risk of attacks that degrade its…
Critical HashiCorp Vulnerability Allows Attackers to Run Code on Host Machine
HashiCorp has disclosed a critical security vulnerability affecting its Vault products that could allow privileged operators to execute arbitrary code on the underlying host machine. The flaw, designated CVE-2025-6000 and tracked as HCSEC-2025-14, impacts both Community and Enterprise editions of…
APT37 Hackers Weaponizes JPEG Files to Attack Windows Systems Leveraging “mspaint.exe” File
A sophisticated new wave of cyberattacks attributed to North Korea’s notorious APT37 (Reaper) group is leveraging advanced malware hidden within JPEG image files to compromise Microsoft Windows systems, signaling a dangerous evolution in evasion tactics and fileless attack techniques. Security…