Google Pays $1.375 Billion to Texas Over Unauthorized Tracking and Biometric Data Collection

10/05/2025 0 Comments 0 tags

Google has agreed to pay the U.S. state of Texas nearly $1.4 billion to settle two lawsuits that accused the company of tracking users’ personal location and maintaining their facial

OtterCookie v4 Adds VM Detection and Chrome, MetaMask Credential Theft Capabilities

09/05/2025 0 Comments 0 tags

The North Korean threat actors behind the Contagious Interview campaign have been observed using updated versions of a cross-platform malware called OtterCookie with capabilities to steal credentials from web browsers

BREAKING: 7,000-Device Proxy Botnet Using IoT, EoL Systems Dismantled in U.S. – Dutch Operation

09/05/2025 0 Comments 0 tags

A joint law enforcement operation undertaken by Dutch and U.S. authorities has dismantled a criminal proxy network that’s powered by thousands of infected Internet of Things (IoT) and end-of-life (EoL)

Malicious npm Packages Infect 3,200+ Cursor Users With Backdoor, Steal Credentials

09/05/2025 0 Comments 0 tags

Cybersecurity researchers have flagged three malicious npm packages that are designed to target the Apple macOS version of Cursor, a popular artificial intelligence (AI)-powered source code editor. “Disguised as developer

Deploying AI Agents? Learn to Secure Them Before Hackers Strike Your Business

09/05/2025 0 Comments 0 tags

AI agents are changing the way businesses work. They can answer questions, automate tasks, and create better user experiences. But with this power comes new risks — like data leaks,

Initial Access Brokers Target Brazil Execs via NF-e Spam and Legit RMM Trials

09/05/2025 0 Comments 0 tags

Cybersecurity researchers are warning of a new campaign that’s targeting Portuguese-speaking users in Brazil with trial versions of commercial remote monitoring and management (RMM) software since January 2025. “The spam

Beyond Vulnerability Management – Can You CVE What I CVE?

09/05/2025 0 Comments 0 tags

The Vulnerability Treadmill The reactive nature of vulnerability management, combined with delays from policy and process, strains security teams. Capacity is limited and patching everything immediately is a struggle. Our

Google Rolls Out On-Device AI Protections to Detect Scams in Chrome and Android

09/05/2025 0 Comments 0 tags

Google on Thursday announced it’s rolling out new artificial intelligence (AI)-powered countermeasures to combat scams across Chrome, Search, and Android. The tech giant said it will begin using Gemini Nano,

Chinese Hackers Exploit SAP RCE Flaw CVE-2025-31324, Deploy Golang-Based SuperShell

09/05/2025 0 Comments 0 tags

A China-linked unnamed threat actor dubbed Chaya_004 has been observed exploiting a recently disclosed security flaw in SAP NetWeaver. Forescout Vedere Labs, in a report published today, said it uncovered

38,000+ FreeDrain Subdomains Found Exploiting SEO to Steal Crypto Wallet Seed Phrases

08/05/2025 0 Comments 0 tags

Cybersecurity researchers have exposed what they say is an “industrial-scale, global cryptocurrency phishing operation” engineered to steal digital assets from cryptocurrency wallets for several years. The campaign has been codenamed