by Syndicated News Feed | Aug 21, 2025 | IT Security
UK-based telecommunications company Colt Technology Services confirms that customer documentation was stolen as Warlock ransomware gang auctions files. The British telecommunications and network services provider previously disclosed it suffered an attack on August...
by Syndicated News Feed | Aug 21, 2025 | IT Security
A significant data theft at Orange Belgium has opened hundreds of thousands of its customers to serious cybersecurity risks. The telecom company confirmed that data pertaining to 850,000 customer accounts was compromised during an intrusion at the end of July, with...
by Syndicated News Feed | Aug 21, 2025 | IT Security
The Federal Bureau of Investigation (FBI) has warned that hackers linked to Russia’s Federal Security Service (FSB) are targeting critical infrastructure organizations in attacks exploiting a 7-year-old vulnerability in Cisco devices. The FBI’s public...
by Syndicated News Feed | Aug 21, 2025 | IT Security
Separating truth from fiction is the first step towards making better parenting decisions. Let’s puncture some of the most common misconceptions about online harassment. 21 Aug 2025 • , 5 min. read Cyberbullying, unfortunately, is on the rise. Data from the...
by Syndicated News Feed | Aug 20, 2025 | IT Security
China cut itself off from much of the global internet for just over an hour on Wednesday. Activist group Great Firewall Report spotted the outage, which it said disrupted all traffic to TCP port 443 – the standard port used for carrying HTTPS traffic. “Between...
by Syndicated News Feed | Aug 20, 2025 | IT Security
OpenAI’s CEO Sam Altman told reporters that GPT-6 is already in the works, and it’ll not take as long as GPT-5. The GPT-6 announcement doesn’t surprise me because OpenAI is slowly becoming a product-first company rather than research-focused. There’s...
by Syndicated News Feed | Aug 20, 2025 | IT Security
Amazon has quietly fixed a couple of security issues in its coding agent: Amazon Q Developer VS Code extension. Attackers could use these vulns to leak secrets, including API keys from a developer’s machine, and run arbitrary code. “We’re aware of...
by Syndicated News Feed | Aug 20, 2025 | IT Security
Hackers are using a novel technique that combines legitimate office.com links with Active Directory Federation Services (ADFS) to redirect users to a phishing page that steals Microsoft 365 logins. The method lets attackers bypass traditional URL-based detection and...
by Syndicated News Feed | Aug 20, 2025 | IT Security
A white-hat hacker has discovered a series of critical flaws in McDonald’s staff and partner portals that allowed anyone to order free food online, get admin rights to the burger slinger’s marketing materials, and could allow an attacker to get a corporate...
by Syndicated News Feed | Aug 19, 2025 | IT Security
A now-patched flaw in popular AI model runner Ollama allows drive-by attacks in which a miscreant uses a malicious website to remotely target people’s personal computers, spy on their local chats, and even control the models the victim’s app talks to, in...