Cyber Security
“`html WhatsApp through username (Source: WABetaInfo) WhatsApp is gearing up to introduce a long-awaited username capability that enables users to interact without ever disclosing their phone numbers, representing a major enhancement in privacy for one of the...
Cyber Security
“`html A recent phishing initiative is actively assaulting enterprises globally by taking advantage of one of the most dependable instruments in digital marketing — Meta’s Business Manager platform. Cybercriminals have devised an ingenious method to dispatch...
Cyber Security
“`html An essential remote code execution (RCE) vulnerability has been uncovered in Apache ActiveMQ Classic, a defect that remained unnoticed for more than a decade and was eventually identified not by a human analyst manually inspecting code, but by Anthropic’s...
Cyber Security
“`html An information security analyst using the pseudonym Chaotic Eclipse (@ChaoticEclipse0) has made public a functional zero-day local privilege escalation (LPE) exploit for Windows, referred to as BlueHammer, along with comprehensive proof-of-concept (PoC)...
Cyber Security
“`html A synchronized supply chain assault has been discovered, targeting developers who create applications on Strapi, a widely utilized open-source content management system. Thirty-six harmful npm packages masquerading as authentic Strapi plugins were...
Cyber Security
“`html Fortinet has released an urgent hotfix after researchers unveiled a significant zero-day flaw in FortiClient EMS that is currently being actively utilized by malicious actors. Designated as CVE-2026-35616 and possessing a CVSSv3 rating of 9.1 (Critical),...
Cyber Security
“`html Each instance you launch LinkedIn in a browser based on Chrome, concealed JavaScript discreetly examines your device for installed applications without your awareness, without your permission, and without a single mention in LinkedIn’s privacy terms. A...
Cyber Security
“`html A recently discovered initiative associated with North Korean state-backed threat groups is utilizing Windows shortcut files, referred to as LNK files, to carry out targeted phishing assaults against entities in South Korea. What renders this initiative...
Cyber Security
“`html VPN For Privacy In the realm of privacy-centric VPNs, various providers emerge prominently in 2026. NordVPN, situated in Panama, delivers powerful security attributes encompassing Double VPN, Onion over VPN, and a no-logs policy that has undergone...
Cyber Security
“`html Mercor AI has formally acknowledged a significant data breach after assertions from the infamous Lapsus$ hacking group that they have acquired 4 terabytes of confidential corporate data. The occurrence, arising from a recent supply chain compromise...