Airoha Chip Vulnerabilities Put Headphones at Risk of Takeover Attacks
Security researchers have identified multiple critical vulnerabilities in Bluetooth system-on-chip (SoC) products developed by Airoha, [...]
Jul
Hawaiian Airlines Reports Cybersecurity Incident Affecting IT Systems
Hawaiian Airlines has confirmed it experienced a cybersecurity incident that disrupted portions of its IT [...]
Jun
Nearly Half of Online Signups Now Fraudulent, Warns Okta
In a stark warning to organizations worldwide, identity and access management provider Okta has revealed [...]
Jun
Microsoft Introduces Free and Paid Options for Windows 10 Security Updates Ahead of 2025 End of Support
As Windows 10 approaches its official end of support (EOS) on October 14, 2025, Microsoft [...]
Jun
Rogue WordPress Plugin Campaign Targets Online Stores with Skimming and Credential Theft
Cybersecurity researchers have uncovered a sophisticated malware campaign targeting WordPress websites through a fake plugin [...]
Jun
Echo Chamber: The Sophisticated Jailbreak Method Exploiting AI Language Models
Cybersecurity researchers are warning about a new and dangerously effective technique to bypass the safety [...]
Jun
XDigo Malware Exploits Windows LNK Vulnerability in Targeted Attacks Across Eastern Europe
Cybersecurity analysts have identified a new strain of Go-based malware, named XDigo, actively used in [...]
Jun
EchoLeak: Critical Zero-Click Vulnerability in Microsoft 365 Copilot Exposes Sensitive Data Without User Interaction
A newly discovered threat called EchoLeak has been classified as a zero-click vulnerability affecting Microsoft [...]
Jun
Meta and Oakley Launch New Smart Glasses Designed for Performance and Style
After months of speculation, Meta has officially revealed its latest wearable tech: a new line [...]
Jun
What is Live Streaming Shopping?
It is common to find product demonstration videos created by third parties; however, it sounds [...]
May