HomeTopics 1

Topics 1

spot_imgspot_imgspot_imgspot_img

Re-Emerging Telegram Phishing Campaign Hijacks User Authorization Prompts

Attackers are abusing Telegram’s own login and authorization workflows to take over accounts no malware, no exploits, just user approval. A newly resurfaced phishing campaign...

Deepfakes & Hyper-Phishing: Winning the AI Arms Race

The New Reality: When Your CEO's Face Becomes a Weapon In February 2024, a finance worker in Hong Kong joined what appeared to be a...

Popular Developer Tool Notepad++ Targeted in State-Sponsored Supply Chain Attack

Notepad++, one of the world’s most widely used open-source text editors, has confirmed it was the victim of a highly targeted, state-sponsored cyberattack that...

Kaspersky Warns of Scam Exploiting OpenAI’s Teamwork Features

Attackers abuse legitimate OpenAI collaboration tools to send convincing scam emails, raising new concerns about trust in widely used AI platforms. Cybersecurity researchers at Kaspersky...

ChatGPT to Test Ads – OpenAI Promises Privacy, Transparency, and Answer Independence

Artificial intelligence is rapidly becoming a personal assistant for learning, productivity, creativity, and decision-making. But who gets access to powerful AI - and at...

Access Granted: How Device Code Phishing Is Fueling Account Takeovers

Phishing is no longer just about fake login pages and stolen passwords. According to new research from Proofpoint, threat actors are increasingly abusing a...

The 2025 CWE Top 25: What the World’s Most Dangerous Software Weaknesses Reveal About the Future of Cybersecurity

The 2025 CWE Top 25 Most Dangerous Software Weaknesses has been released, and the message is clear: the same deeply rooted coding flaws continue...

Subscribe

- Never miss a story with notifications

- Gain full access to our premium content

- Browse free from up to 5 devices at once

Must read

spot_imgspot_imgspot_imgspot_img