information security news

AI chat privacy at risk: Microsoft details Whisper Leak side-channel attack

Microsoft uncovered Whisper Leak, a side-channel attack that lets network snoopers infer AI chat topics despite encryption, risking user privacy.…

1 month ago

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 70

Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape Malware…

1 month ago

Security Affairs newsletter Round 549 by Pierluigi Paganini – INTERNATIONAL EDITION

A new round of the weekly Security Affairs newsletter has arrived! Every week, the best security articles from Security Affairs…

1 month ago

A new Italian citizen was targeted with Paragon’s Graphite spyware. We have a serious problem

An Italian political adviser was targeted with Paragon’s Graphite spyware, becoming the fifth Italian in the ongoing government surveillance activity.…

1 month ago

LANDFALL spyware exploited Samsung zero-day CVE-2025-21042 in Middle East attacks

A now-patched Samsung Galaxy flaw, tracked as CVE-2025-21042, was exploited as a zero-day to deploy LANDFALL spyware in targeted attacks…

1 month ago

Cisco fixes critical UCCX flaw allowing Root command execution

Cisco patched a critical flaw in its Unified Contact Center Express (UCCX) software that allowed attackers to execute commands with…

1 month ago

Russia-linked APT InedibleOchotense impersonates ESET to deploy backdoor on Ukrainian systems

Russia-linked group InedibleOchotense used fake ESET installers in phishing attacks on Ukrainian targets in May 2025. Russia-linked group InedibleOchotense used…

1 month ago

Clop Ransomware group claims the breach of The Washington Post

The Clop Ransomware group claims the breach of The Washington Post and added the American daily newspaper to its Tor data leak…

1 month ago

Google sounds alarm on self-modifying AI malware

Google warns malware now uses AI to mutate, adapt, and collect data during execution, boosting evasion and persistence. Google’s Threat…

1 month ago

Alleged Russia-linked Curly COMrades exploit Windows Hyper-V to evade EDRs

Curly COMrades threat actors exploit Windows Hyper-V to hide Linux VMs, evade EDR tools, and deploy custom malware undetected. Bitdefender…

1 month ago

This website uses cookies.