Featured

ChatGPT’s New Calendar Integration Can Be Abused to Steal Emails

ChatGPT’s New Calendar Integration Can Be Abused to Steal Emails 2025-09-16 at 14:05 By Eduard Kovacs EdisonWatch researchers demonstrated the new hack after OpenAI added support for MCP tools in ChatGPT. The post ChatGPT’s New Calendar Integration Can Be Abused to Steal Emails appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View […]

React to this headline:

Loading spinner

ChatGPT’s New Calendar Integration Can Be Abused to Steal Emails Read More »

Apple Rolls Out iOS 26, macOS Tahoe 26 With Patches for Over 50 Vulnerabilities

Apple Rolls Out iOS 26, macOS Tahoe 26 With Patches for Over 50 Vulnerabilities 2025-09-16 at 11:54 By Ionut Arghire Apple has announced major mobile and desktop platform releases and addressed an exploited bug in older platforms. The post Apple Rolls Out iOS 26, macOS Tahoe 26 With Patches for Over 50 Vulnerabilities appeared first

React to this headline:

Loading spinner

Apple Rolls Out iOS 26, macOS Tahoe 26 With Patches for Over 50 Vulnerabilities Read More »

Samsung Patches Zero-Day Exploited Against Android Users

Samsung Patches Zero-Day Exploited Against Android Users 2025-09-15 at 11:21 By Ionut Arghire Reported by Meta and WhatsApp, the vulnerability leads to remote code execution and was likely exploited by a spyware vendor. The post Samsung Patches Zero-Day Exploited Against Android Users appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original

React to this headline:

Loading spinner

Samsung Patches Zero-Day Exploited Against Android Users Read More »

Payment System Vendor Took Year+ to Patch Infinite Card Top-Up Hack: Security Firm

Payment System Vendor Took Year+ to Patch Infinite Card Top-Up Hack: Security Firm 2025-09-12 at 11:47 By Eduard Kovacs KioSoft was notified about a serious NFC card vulnerability in 2023 and only recently claimed to have released a patch. The post Payment System Vendor Took Year+ to Patch Infinite Card Top-Up Hack: Security Firm appeared

React to this headline:

Loading spinner

Payment System Vendor Took Year+ to Patch Infinite Card Top-Up Hack: Security Firm Read More »

UAE’s K2 Think AI Jailbroken Through Its Own Transparency Features

UAE’s K2 Think AI Jailbroken Through Its Own Transparency Features 2025-09-11 at 15:24 By Kevin Townsend Researchers exploited K2 Think’s built-in explainability to dismantle its safety guardrails, raising new questions about whether transparency and security in AI can truly coexist. The post UAE’s K2 Think AI Jailbroken Through Its Own Transparency Features appeared first on

React to this headline:

Loading spinner

UAE’s K2 Think AI Jailbroken Through Its Own Transparency Features Read More »

Remote CarPlay Hack Puts Drivers at Risk of Distraction and Surveillance

Remote CarPlay Hack Puts Drivers at Risk of Distraction and Surveillance 2025-09-11 at 13:27 By Eduard Kovacs Oligo Security has shared details on an Apple CarPlay attack that hackers may be able to launch without any interaction. The post Remote CarPlay Hack Puts Drivers at Risk of Distraction and Surveillance appeared first on SecurityWeek. This

React to this headline:

Loading spinner

Remote CarPlay Hack Puts Drivers at Risk of Distraction and Surveillance Read More »

Apple Unveils iPhone Memory Protections to Combat Sophisticated Attacks

Apple Unveils iPhone Memory Protections to Combat Sophisticated Attacks 2025-09-10 at 15:54 By Eduard Kovacs Apple’s new Memory Integrity Enforcement (MIE) brings always-on memory-safety protection covering key attack surfaces — including the kernel and over 70 userland processes. The post Apple Unveils iPhone Memory Protections to Combat Sophisticated Attacks appeared first on SecurityWeek. This article

React to this headline:

Loading spinner

Apple Unveils iPhone Memory Protections to Combat Sophisticated Attacks Read More »

Highly Popular NPM Packages Poisoned in New Supply Chain Attack

Highly Popular NPM Packages Poisoned in New Supply Chain Attack 2025-09-10 at 11:45 By Ionut Arghire Designed to intercept cryptocurrency transactions, the malicious code reached 10% of cloud environments. The post Highly Popular NPM Packages Poisoned in New Supply Chain Attack appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source

React to this headline:

Loading spinner

Highly Popular NPM Packages Poisoned in New Supply Chain Attack Read More »

Microsoft Patches 86 Vulnerabilities

Microsoft Patches 86 Vulnerabilities 2025-09-09 at 21:57 By Eduard Kovacs Microsoft has released patches for dozens of flaws in Windows and other products, including ones with ‘exploitation more likely’ rating. The post Microsoft Patches 86 Vulnerabilities appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source React to this headline:

React to this headline:

Loading spinner

Microsoft Patches 86 Vulnerabilities Read More »

Mitsubishi Electric to Acquire Nozomi Networks for Nearly $1 Billion

Mitsubishi Electric to Acquire Nozomi Networks for Nearly $1 Billion 2025-09-09 at 14:00 By Eduard Kovacs The industrial cybersecurity firm will become a wholly owned subsidiary of Mitsubishi Electric. The post Mitsubishi Electric to Acquire Nozomi Networks for Nearly $1 Billion appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source

React to this headline:

Loading spinner

Mitsubishi Electric to Acquire Nozomi Networks for Nearly $1 Billion Read More »

Salesloft GitHub Account Compromised Months Before Salesforce Attack

Salesloft GitHub Account Compromised Months Before Salesforce Attack 2025-09-08 at 16:06 By Ionut Arghire The list of impacted cybersecurity firms has been expanded to include BeyondTrust, Bugcrowd, CyberArk, Cato Networks, JFrog, and Rubrik. The post Salesloft GitHub Account Compromised Months Before Salesforce Attack appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View

React to this headline:

Loading spinner

Salesloft GitHub Account Compromised Months Before Salesforce Attack Read More »

Fintech Firm Wealthsimple Says Supply Chain Attack Resulted in Data Breach

Fintech Firm Wealthsimple Says Supply Chain Attack Resulted in Data Breach 2025-09-08 at 13:05 By Eduard Kovacs Canadian firm Wealthsimple says a data breach impacts the information of some customers, but accounts and funds remain secure. The post Fintech Firm Wealthsimple Says Supply Chain Attack Resulted in Data Breach appeared first on SecurityWeek. This article

React to this headline:

Loading spinner

Fintech Firm Wealthsimple Says Supply Chain Attack Resulted in Data Breach Read More »

More Cybersecurity Firms Hit by Salesforce-Salesloft Drift Breach

More Cybersecurity Firms Hit by Salesforce-Salesloft Drift Breach 2025-09-05 at 11:51 By Ionut Arghire Proofpoint, SpyCloud, Tanium, and Tenable confirmed that hackers accessed information stored in their Salesforce instances. The post More Cybersecurity Firms Hit by Salesforce-Salesloft Drift Breach appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source React to

React to this headline:

Loading spinner

More Cybersecurity Firms Hit by Salesforce-Salesloft Drift Breach Read More »

Recent SAP S/4HANA Vulnerability Exploited in Attacks

Recent SAP S/4HANA Vulnerability Exploited in Attacks 2025-09-05 at 11:09 By Eduard Kovacs A critical SAP S/4HANA code injection flaw tracked as CVE-2025-42957 and allowing full system takeover has been exploited in the wild. The post Recent SAP S/4HANA Vulnerability Exploited in Attacks appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View

React to this headline:

Loading spinner

Recent SAP S/4HANA Vulnerability Exploited in Attacks Read More »

Apple Seeks Researchers for 2026 iPhone Security Program

Apple Seeks Researchers for 2026 iPhone Security Program 2025-09-04 at 18:23 By Eduard Kovacs Security researchers interested in participating in the 2026 Apple Security Research Device program can apply until October 31. The post Apple Seeks Researchers for 2026 iPhone Security Program appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original

React to this headline:

Loading spinner

Apple Seeks Researchers for 2026 iPhone Security Program Read More »

Two Exploited Vulnerabilities Patched in Android

Two Exploited Vulnerabilities Patched in Android 2025-09-04 at 11:40 By Ionut Arghire Elevation of privilege flaws in Android Runtime (CVE-2025-48543) and Linux kernel (CVE-2025-38352) have been exploited in targeted attacks. The post Two Exploited Vulnerabilities Patched in Android appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source React to this

React to this headline:

Loading spinner

Two Exploited Vulnerabilities Patched in Android Read More »

US Cybersecurity Agency Flags Wi-Fi Range Extender Vulnerability Under Active Attack

US Cybersecurity Agency Flags Wi-Fi Range Extender Vulnerability Under Active Attack 2025-09-03 at 22:15 By Ionut Arghire Flaw allows attackers to reset and hijack TP-Link TL-WA855RE devices; CISA urges users to retire discontinued extenders. The post US Cybersecurity Agency Flags Wi-Fi Range Extender Vulnerability Under Active Attack appeared first on SecurityWeek. This article is an

React to this headline:

Loading spinner

US Cybersecurity Agency Flags Wi-Fi Range Extender Vulnerability Under Active Attack Read More »

WhatsApp Zero-Day Exploited in Attacks Targeting Apple Users

WhatsApp Zero-Day Exploited in Attacks Targeting Apple Users 2025-09-02 at 14:48 By Ionut Arghire The vulnerability (CVE-2025-55177) was exploited along an iOS/macOS zero-day in suspected spyware attacks. The post WhatsApp Zero-Day Exploited in Attacks Targeting Apple Users appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source React to this headline:

React to this headline:

Loading spinner

WhatsApp Zero-Day Exploited in Attacks Targeting Apple Users Read More »

Ransomware Group Exploits Hybrid Cloud Gaps, Gains Full Azure Control in Enterprise Attacks

Ransomware Group Exploits Hybrid Cloud Gaps, Gains Full Azure Control in Enterprise Attacks 2025-08-29 at 16:25 By Ionut Arghire Storm-0501 has been leveraging cloud-native capabilities for data exfiltration and deletion, without deploying file-encrypting malware. The post Ransomware Group Exploits Hybrid Cloud Gaps, Gains Full Azure Control in Enterprise Attacks appeared first on SecurityWeek. This article

React to this headline:

Loading spinner

Ransomware Group Exploits Hybrid Cloud Gaps, Gains Full Azure Control in Enterprise Attacks Read More »

China’s Salt Typhoon Hacked Critical Infrastructure Globally for Years

China’s Salt Typhoon Hacked Critical Infrastructure Globally for Years 2025-08-28 at 17:21 By Ionut Arghire China-linked APT ‘Salt Typhoon’ exploited known router flaws to maintain persistent access across telecom, government, and military networks, giving Beijing’s intelligence services global surveillance reach. The post China’s Salt Typhoon Hacked Critical Infrastructure Globally for Years appeared first on SecurityWeek.

React to this headline:

Loading spinner

China’s Salt Typhoon Hacked Critical Infrastructure Globally for Years Read More »

Scroll to Top