MORNING NEWS | Early Birds   [top] |
Italy’s universities double down on AI compliance, while US institutions embrace AI as an educational tool. This feature investigates the regulatory, cultural, and ethical rift shaping the future of higher education in an AI-driven world.
#AI Regulation | #US Universities | #Algorithmic Discrimination
As social robots become more human-like, our tendency to attribute intentions to them creates new ethical and security risks. This feature explores the psychology behind our trust in robots, the dangers of overestimating their intelligence, and how research is helping us recalibrate our expectations.
As data centers multiply to meet digital demand, cities face tough choices about energy, land, and regulations. Can urban growth keep pace without sacrificing sustainability and quality of life?
SMEs face a new challenge: blending stability and agility to survive in a rapidly evolving workplace. 'Stagility' offers a blueprint for anchoring work, organizations, and people - ensuring resilience and sustained performance.
As B2B marketers struggle with junk leads and wasted budgets, artificial intelligence offers a new path: smarter, data-driven lead qualification that delivers results.
Whaling and CEO fraud are putting company leaders in the crosshairs of cybercriminals. This feature investigates why executives are so vulnerable - and what organizations can do to protect the top floor.
A covert threat group, UnsolicitedBooker, has launched targeted cyber attacks on Central Asian telecoms using rare Chinese-origin backdoors, LuciDoor and MarsSnake, marking a new escalation in global cyber espionage.
Google’s new Wear OS update promises independent earthquake alerts, but critical questions remain about device compatibility and user safety. Here’s what you need to know.
Nvidia is secretly developing an Arm-based laptop chip for a 2026 launch, pitting itself against Apple, Qualcomm, Intel, and AMD. Discover how this bold move could disrupt the Windows laptop market.
WhatsApp is rolling out an optional password feature to enhance login protection. Learn how this extra layer could defend your account from SIM swapping, phishing, and other account hijack threats.
A newly discovered flaw in Ruby background job workers allows attackers to take over systems using maliciously crafted JSON payloads. This critical vulnerability, rooted in unsafe deserialization practices, highlights the risks of trusting 'safe' data formats in backend automation.
#Ruby | #JSON | #Vulnerability
Starkiller, a commercial phishing platform, proxies real login pages to defeat MFA and evade detection. Its advanced features mark a new era of cybercrime, forcing defenders to rethink how to spot and stop phishing attacks.
#Phishing | #MFA | #Cybercrime
GrayCharlie’s campaign uses compromised WordPress sites and fake update prompts to install NetSupport RAT, bypassing even multi-factor authentication and exfiltrating sensitive data worldwide.
Hackers are transforming the iconic lightbox into a programmable LED matrix with WiFi, blending stealth, open-source code, and creative potential. Discover how this decor trend became a cyber playground.
ZeroDayRAT is a subscription-based spyware kit targeting both Android and iOS devices, combining live surveillance with direct financial theft tools. Marketed on Telegram and equipped with a user-friendly dashboard, it enables even non-technical cybercriminals to spy and steal from mobile users worldwide.
Attackers are leveraging trusted AI agent skills in the OpenClaw ecosystem to trick users into manually installing the AMOS Stealer and surrendering passwords. This new supply chain threat targets macOS users, exploiting AI workflows for rapid data theft and exfiltration.
A Romanian hacker’s guilty plea reveals how stolen government network access became a commodity on the dark web, exposing systemic risks and prompting a global law enforcement response.
Chinese AI labs DeepSeek, Moonshot AI, and MiniMax orchestrated a covert, industrial-scale attack on Anthropic’s Claude models, using distillation to steal advanced reasoning and coding skills. The campaign involved over 16 million exchanges and exposes new risks in the global AI arms race.
Qilin ransomware has claimed responsibility for attacking Envelex Thailand, signaling a rising threat to businesses in Southeast Asia. Get the facts and analysis on this latest cybercrime incident.
Spanish police have arrested four alleged members of Anonymous Fénix following a series of DDoS attacks on government websites, signaling a major crackdown on hacktivist cybercrime.
Dragonforce, a notorious ransomware group, has targeted Jac Vandenberg, a leading US importer of fresh produce. The cyberattack threatens supply chain stability and highlights growing risks to the food industry.
AI quietly influences your web experience through cookies and algorithms. Learn why understanding AI is key to digital autonomy and how to protect your privacy.
With technology infiltrating every aspect of civic life, the struggle over personal data protection is redefining democracy. Discover why privacy by design, transparency, and accountability are now essential for both citizens and businesses.
Artificial intelligence is transforming marketing - but at what cost to creativity? Explore the conflict between AI-powered efficiency and the risk of creative conformity, and learn why the human touch still matters in the digital age.
NIS 2 isn’t just about filling files with documents - it’s a wake-up call for organizational leaders to take direct, ongoing responsibility for digital risk. Here’s how the new rules elevate cybersecurity to the boardroom and demand proof of governance at every step.
#NIS 2 Directive | #Cybersecurity Governance | #Digital Risk
January 2026 saw a surge in cybercrime innovation and law enforcement pushback. From targeted ransomware to deepfake-powered phishing, the month set a dramatic tone for the year’s digital battles.
Google Chrome rushed to resolve critical vulnerabilities, reminding users of the constant cyber threats facing browsers. Learn how these flaws were discovered, what they could have enabled, and why timely updates are crucial for your security.
Anthropic exposes a sweeping industrial-scale operation by Chinese AI companies to copy its Claude language model through millions of illicit queries, raising urgent questions about AI security and global tech rivalry.
Google rushed an emergency Chrome update to patch three dangerous vulnerabilities affecting billions of users. Here’s what went wrong, how attackers could exploit the flaws, and why fast updates are essential for browser security.
A critical vulnerability in HPE Telco Service Activator could let attackers bypass remote access restrictions, putting global telecom operations at risk. Immediate patching is essential to prevent data breaches and service disruption.
A critical buffer overflow in Grandstream GXP1600 VoIP phones exposes millions of devices to unauthenticated remote code execution. With public exploit code available, organizations must act fast to patch and secure their voice networks.
A typosquatted copy of the Huorong Security site is delivering ValleyRAT, a modular backdoor, to unsuspecting users. The campaign uses advanced evasion tactics and has rapidly expanded after the malware builder leaked online.
Hackers are smuggling malware inside innocent-looking images distributed via a fake NPM package, using advanced steganography and evasion techniques to hijack Windows developer machines with the Pulsar RAT.
Researchers have discovered a critical vulnerability in Moxa UC-1222A Secure Edition devices, allowing attackers to extract LUKS disk encryption keys by eavesdropping on the SPI bus between the CPU and TPM chip. This hardware-level flaw exposes industrial Linux systems to significant risk if physical access is possible.
#Linux Security | #Industrial Control Systems | #Hardware Vulnerability
A critical deserialization flaw in RubitMQ job workers using Ruby's Oj library lets attackers turn harmless JSON into system-level code execution. Find out how this vulnerability works, why it's so dangerous, and what steps are needed to secure your systems.
The Envelex ransomware attack brought Thai businesses to a halt, revealing critical vulnerabilities and sparking calls for stronger cybersecurity. Here’s how the digital siege unfolded - and what it means for the future.
The PoindexterHill ransomware attack highlights how cyber gangs are targeting organizations of all sizes, leveraging leak sites like Ransomfeed to pressure victims. This investigation unpacks the attack’s anatomy, the business model behind modern ransomware, and urgent lessons for digital defense.
The ransomware attack on Induherzig-SAS exposes critical vulnerabilities in industrial firms, highlighting how hackers leverage legacy systems and operational technology weaknesses for maximum disruption.
Big Tech’s ‘sovereign cloud’ promises to Europe unravel under legal scrutiny, exposing the limits of data residency and the persistent grip of US law. Discover how sovereignty-washing threatens cybersecurity and what Europe must do next.
North Korean state-sponsored hackers are using fake IT worker identities, deepfakes, and malware-laced interviews to infiltrate global firms and fund weapons programs. Here’s how the scheme works - and how to stay ahead of the threat.
QUOD is a full-featured Quake-inspired shooter packed into just 64kB, showcasing demoscene ingenuity and technical mastery. Explore how custom tools, optimized assets, and a bespoke programming language make it possible.
A Swiss-based operation weaponized AI models DeepSeek and Claude to launch automated, global attacks against FortiGate firewalls. Learn how custom automation, exposed credentials, and AI-driven workflows enabled massive breaches across 55 countries.
WhatsApp is introducing an optional password feature to bolster account security. By requiring a user-created alphanumeric password alongside existing verification methods, WhatsApp aims to thwart even sophisticated account takeover attempts.
ClickFix infostealer is back, using fake CAPTCHA challenges to lure users into launching credential-stealing malware. Discover how this campaign blends social engineering with advanced in-memory attacks to evade detection and compromise sensitive data.
A major data breach at Odido, allegedly orchestrated by ShinyHunters, has exposed millions of sensitive records. Our investigation unpacks the scope, risks, and implications for customers and the Dutch telecom sector.
Anthropic’s warnings about AI data theft by Chinese firms have backfired, with Elon Musk highlighting the company’s own history of copyright lawsuits and settlements. The episode exposes the complex - and often hypocritical - nature of data use in the AI industry.
Thegentlemen ransomware group has struck Silver Lake Medical Center in Los Angeles, threatening critical healthcare operations. The incident highlights the growing vulnerability of hospitals to cyberattacks.
A team of engineers and volunteers takes on the perilous task of restoring a 90-year-old Lancashire boiler, battling leaks and time to bring Victorian steam power back to life at Claymills Pumping Station.
#Lancashire boiler | #Steam restoration | #Industrial heritage
Google has issued an emergency Chrome update to fix three major security flaws threatening user safety. Discover the nature of these vulnerabilities and why updating your browser is crucial.
#Chrome vulnerabilities | #Google update | #Cybersecurity threats
Ransomware gang Incransom claims responsibility for cyberattacks on ACWA Power and Larsen & Toubro, exposing vulnerabilities in global energy and engineering sectors.
ACWA Power and Larsen & Toubro, pillars of energy and infrastructure, are the latest targets of ransomware gangs, as revealed by dark web leak site Ransomfeed. The attacks underscore rising cyber risks to global critical infrastructure.
EARLY BIRDS | [top] |
Projection clocks have illuminated our nights for over a century. Dive into their surprising history, technical evolution, and the inventive ways hackers and DIYers have reimagined this overlooked gadget.
PCB Tracer, a browser-based tool, makes reverse engineering circuit boards as easy as snapping a photo. With AI-powered schematic generation and intuitive annotation, it’s transforming hardware analysis - raising fresh questions about security and innovation.
NVIDIA’s new alliance with Akamai, Forescout, Siemens, and other cyber leaders is quietly embedding AI and zero trust security into the world’s most critical infrastructure. Explore how this coalition is raising the bar for industrial cybersecurity.
Optimizely has confirmed a data breach after a voice phishing attack exposed business contact information. The incident, linked to the ShinyHunters group, highlights the growing risk of social engineering and vishing campaigns targeting major organizations.
A months-old glitch in classic Outlook is making the mouse pointer vanish, crippling productivity and leaving users frustrated. Microsoft is investigating, but for now, workarounds are all that's on offer.
Spanish authorities have dismantled the ‘Anonymous Fénix’ hacktivist cell, arresting four suspects accused of DDoS attacks on government sites after the 2024 Valencia floods. The case exposes the blurred lines between hacktivism and cybercrime.
Millions of Android users are at risk as top mental health apps are found to harbor over 1,500 security vulnerabilities, potentially exposing deeply personal therapy data and medical information.
An unsophisticated attacker breached over 600 FortiGate firewalls worldwide using generative AI, demonstrating how AI is enabling large-scale cybercrime even for novices. Weak credentials and exposed management ports - not software bugs - were the real vulnerabilities.
The Enigma machine’s story is a cautionary tale for cybersecurity experts, warning against technological arrogance and highlighting the enduring impact of human error in digital defense.
Iran's MuddyWater threat group has escalated its cyber offensive with AI-driven malware targeting organizations across the Middle East and Africa. Operation Olalampo signals a new era of sophisticated, stealthy attacks, underscoring the urgent need for robust cyber defenses.
ATM jackpotting attacks surged across the US in 2025, with hackers exploiting outdated security to steal millions. Discover how these high-tech heists unfolded and what banks are doing to fight back.
A sophisticated XMRig malware campaign is hijacking computers for crypto mining by exploiting pirated software, vulnerable drivers, and worm-like propagation. With a built-in logic bomb and AI-assisted toolkits, this threat is rapidly spreading - even to air-gapped machines.
APT28’s Operation MacroMaze exploited basic macros and public webhooks to infiltrate European organizations, proving that low-tech attacks can be highly effective and difficult to detect.
Projection clocks cast time onto your ceiling, but their story is richer than you think. From century-old patents to modern LED gadgets and DIY hacks, discover how this brilliant blend of optics and invention quietly revolutionized the way we check the hour at night.
#Projection clocks | #History of innovation | #DIY ingenuity
ATABoy is an open-source IDE-to-USB bridge built to recover data from even the oldest hard drives. Unlike typical adapters, it supports both LBA and CHS addressing, making digital archaeology accessible to all.
2026 has seen a dramatic rise in data breaches, with AI-powered attacks targeting everyone - not just major corporations. This investigative feature explores how the threat landscape has changed, why basic mistakes still lead to massive fallout, and what practical steps can keep your data safe.
UK regulators have fined adult site operator 8579 LLC $1.8 million for failing to verify user ages, spotlighting growing tensions between child protection and digital privacy.
Cipherforce, a rising ransomware group, has publicly claimed an attack on Accuick in February 2026. The incident highlights the increasing boldness and evolving tactics of cybercriminals in the digital extortion landscape.
Qilin ransomware has named GENERON as its newest victim in a high-profile cyberattack, raising alarms across the cybersecurity landscape. Learn what happened, how ransomware groups operate, and what organizations can do to protect themselves.
#Qilin Ransomware | #GENERON Attack | #Cybersecurity Threats
The notorious Qilin gang has claimed a fresh cyberattack on payment tech firm Spire Payments, raising alarms across the fintech sector. Here’s what we know so far.
Dragonforce ransomware group has claimed an attack on Zelenkofske Axelrod, a CPA firm specializing in governmental and non-profit clients. The breach highlights growing risks to sensitive organizations and the evolving tactics of cybercriminals.
French cruise company Rivages Du Monde has been targeted by the Qilin ransomware group, underscoring rising cyber risks for luxury travel operators. Here’s what we know so far.
Kittykatkrew, a lesser-known ransomware group, has posted a new 'test' victim on their leak site. Experts debate whether this is a dry run, a warning, or the start of a new extortion campaign.
Rocky Mountain Care has been targeted by the Qilin ransomware group, bringing renewed attention to cybersecurity risks in healthcare. Learn what happened, why it matters, and what it means for patient safety.
Silentransomgroup has claimed responsibility for a ransomware attack against Orrick, Herrington & Sutcliffe, exposing the growing cyber risks facing major law firms. Here’s what happened and why it matters.
Xona Systems’ Platform v5.5 redefines secure remote access for critical infrastructure, introducing resilient features like Session Hold and RDP Auto-Reconnect to keep operators connected and compliant - even when networks fail.