by Syndicated News Feed | Dec 5, 2025 | IT Security |
The FBI warns of criminals altering images shared on social media and using them as fake proof of life photos in virtual kidnapping ransom scams. This is part of a public service announcement published today about criminals contacting victims via text message,...
by Syndicated News Feed | Dec 5, 2025 | IT Security |
The UK government has kicked off plans to ramp up police use of facial recognition, undeterred by a mounting civil liberties backlash and fresh warnings that any expansion risks turning public spaces into biometric dragnets. A new Home Office consultation [PDF]...
by Syndicated News Feed | Dec 4, 2025 | IT Security
Anthropic could have scored an easy $4.6 million by using its Claude AI models to find and exploit vulnerabilities in blockchain smart contracts. The AI upstart didn’t use the attack it found, which would have been an illegal act that would also undermine the...
by Syndicated News Feed | Dec 4, 2025 | IT Security
Threat actors have been exploiting a command injection vulnerability in Array AG Series VPN devices to plant webshells and create rogue users. Array Networks fixed the vulnerability in a May security update, but has not assigned an identifier, complicating efforts to...
by Syndicated News Feed | Dec 4, 2025 | IT Security
The Predator spyware from surveillance company Intellexa has been using a zero-click infection mechanism dubbed “Aladdin,” which compromised specific targets by simply viewing a malicious advertisement. This powerful and previously unknown infection vector is...
by Syndicated News Feed | Dec 4, 2025 | IT Security
Microsoft has quietly closed off a critical Windows shortcut file bug long abused by espionage and cybercrime networks. The flaw, tracked as CVE-2025-9491, allows malicious .lnk shortcut files to hide harmful command-line arguments from users, enabling hidden code...