The massive clash between adult content creators and pirates, now transferred to automated copyright protection systems, is beginning to radically change the face of the Internet. Every day, it becomes...
Yesterday, the Red Hot Cyber website was inaccessible for about an hour. But what's going on, we wondered? After a series of analyses, here's the result: the internet is changing...
A large-scale cyberattack has targeted security firm Zscaler, which has officially confirmed it was the victim of a supply chain breach. This attack exposed customer contact data due to compromised...
Last week, it emerged that criminal hackers had compromised the sales automation platform Salesloft and stolen OAuth and update tokens from customers in its AI agent Drift, designed to integrate...
A disturbing episode of electronic warfare (EW) directly involved the President of the European Commission, Ursula von der Leyen. On approach to Plovdiv Airport in Bulgaria, the jet carrying the...
Scientists have assembled the key elements of a computing system into a single, flexible, and even machine-washable thread. The idea is to weave many of these threads into fabric to...
A complex watering hole campaign, orchestrated by the notorious hacker group APT29, linked to Russian foreign intelligence services, was neutralized by Amazon's cybersecurity team. This latest campaign marks a significant...
Participants in the cyberattack on the Moscow Electronic School were offered towork to improve cybersecurity and other digital services of the capital's administration. This all comes after September 17, 2022,...
Anthropic has raised the alarm about a new threat related to "smart" browser extensions: Websites can infiltrate hidden commands that an AI agent will execute without thinking. Anthropic has released...
Google representatives announced that starting in 2026, only apps from verified developers will be able to be installed on certified Android devices. This measure aims to combat malware and financial...