ThreatsDay Bulletin: active exploits, supply chain attacks, AI abuse, and stealth data risks observed this week.
Attackers are abusing a modified Android NFC app to steal payment card data and PINs for contactless fraud and ATM cash-outs.
CVE-2026-34040 lets attackers bypass some Docker authentication plugins by allowing an empty request body. Present since 2024, this bug was caused by a previous fix to the auth workflow. In the ...
Rowhammer attacks have been around since 2014, and mitigations are in place in most modern systems, but the team at gddr6.fail has found ways to apply the attack to current-generation GPUs.
Security researchers say they have identified a hack-for-hire group targeting journalists, activists, and government officials across the Middle East and North Africa. The hackers used phishing ...
Thousands of men are members of Telegram groups and channels that advertise and sell hacking and surveillance services that can be used to harass friends, wives and girlfriends, and former partners, ...
I've been writing and editing stories for almost two decades that help people use technology and productivity techniques to work better, live better, and protect their privacy and personal data. As ...
I wore the world's first HDR10 smart glasses TCL's new E Ink tablet beats the Remarkable and Kindle Anker's new charger is one of the most unique I've ever seen Best laptop cooling pads Best flip ...
This voice experience is generated by AI. Learn more. This voice experience is generated by AI. Learn more. Android phones can be hacked in 60 seconds. Updated March 18: Article now updated with a ...
A sophisticated iOS exploit kit called Coruna, linked to US government hacking tools, has been discovered in the wild and is now being used by cybercriminals. The kit can compromise iPhones running ...
If there’s one universal experience with AI-powered code development tools, it’s how they feel like magic until they don’t. One moment, you’re watching an AI agent slurp up your codebase and deliver a ...