Microsoft has removed a Samsung application from the Microsoft Store after it caused serious system access issues on some Windows computers. The issue, known as the Samsung app C drive bug, prevented affected users from accessing the main system drive on their devices. The application was designed to connect Samsung Galaxy devices with Windows PCs.…
A new European platform aims to challenge how modern social media works. The FolkPost social network promises a space without bots, targeted advertising, or algorithm-driven feeds. The project is being developed by Ukrainian software engineer Ievgen Medvediev. He believes many existing platforms prioritize engagement and advertising revenue over meaningful communication. FolkPost aims to change that…
Cybercriminals continue to experiment with new ways to bypass spam filters and reach victims. One emerging tactic involves delivering fake invoices through calendar invitations. Security researchers recently identified a campaign where scammers use calendar events to push fraudulent payment alerts. The calendar invoice scam relies on urgency and confusion. Victims receive a calendar invite claiming…
Security researchers helped uncover thousands of software flaws last year, pushing the Google bug bounty program to a record payout. The company reported paying $17.1 million to security researchers who discovered vulnerabilities across its products. Bug bounty programs reward independent researchers who report security flaws responsibly. Instead of exploiting weaknesses, researchers disclose them to the…
A recent supply chain incident exposed website visitors to cryptocurrency theft. The AppsFlyer crypto stealer attack involved malicious JavaScript distributed through the company’s Web SDK. AppsFlyer provides marketing analytics tools used by many websites worldwide. The Web SDK allows companies to track user activity and marketing performance. Because the script loads directly in browsers, it…
A recent Windows 11 issue has created serious problems for some Samsung laptop users. The Windows 11 C drive bug prevents affected devices from accessing the system drive. Users report receiving an “access denied” message when opening the C: drive. Because the drive stores the operating system, the error disrupts many normal tasks. The issue…
Online gaming platforms attract millions of players every day. These platforms also attract cybercriminals looking for new ways to spread malware. A recent investigation revealed that several Steam titles secretly installed malicious software on players’ computers. The discovery triggered a federal investigation in the United States. Authorities are now asking gamers to report infections linked…
A recent cybersecurity incident targeted one of Poland’s most important scientific institutions. The Poland nuclear cyberattack involved an attempted breach of the National Centre for Nuclear Research. Security systems detected the suspicious activity early. Internal teams quickly responded and secured the network. Officials confirmed that the attack did not disrupt operations. The institute continues operating…
Large fraud networks increasingly rely on social media to reach victims around the world. Platforms allow attackers to create convincing identities and communicate directly with potential targets. Meta recently disrupted a major part of that activity by removing thousands of Facebook scam accounts linked to organized cybercrime groups. The investigation uncovered coordinated fraud operations operating…
Cybercrime networks rely on massive online infrastructure to run scams and malware campaigns. Investigators recently disrupted a significant portion of that infrastructure through a coordinated international effort. The INTERPOL website takedown targeted thousands of malicious domains and servers used for phishing, fraud, and ransomware operations. Law enforcement agencies across multiple regions worked together to identify…