A recent Facebook outage disrupted access to the platform and several business services operated by Meta. The incident affected regular users as well as companies that depend on Facebook’s advertising infrastructure. During the disruption, many users experienced login failures, feed loading issues, and service errors. At the same time, advertisers reported problems accessing Meta Ads…
Security researchers have uncovered several Perplexity Comet vulnerabilities affecting the company’s new AI-powered browser. The flaws highlight how agentic browsers introduce new security risks when automated assistants interact with web content. Comet integrates an AI agent directly into the browsing environment. The assistant can summarize pages, retrieve information, and perform tasks across different websites. These…
Google released a major Android security update that fixes an Android zero-day attackers actively exploited in real-world campaigns. The flaw appears in the latest monthly Android Security Bulletin, which addresses 129 security issues. The confirmed exploitation increases the urgency of this update. Users who delay installation leave their devices exposed to targeted attacks. Details of…
A phishing campaign is abusing Progressive Web App technology to steal account credentials and multi-factor authentication codes. The attack uses a fake Google security page to trick victims into installing a malicious web-based app. The fake Google security site looks convincing and mimics legitimate account protection workflows. Once victims install the app, attackers gain access…
An Alabama man has pleaded guilty to federal charges tied to a years-long sextortion campaign that targeted hundreds of women across the United States. Prosecutors say he used hacked social media accounts, threats, and coercion to exploit victims and demand money or explicit content. The Alabama sextortion case underscores how social engineering attacks can escalate…
A federal court has sentenced a Florida woman to prison for running a large-scale Microsoft license fraud scheme that generated millions in revenue. Prosecutors proved that she trafficked thousands of illicit Certificate of Authenticity labels and sold extracted product keys worldwide. The case highlights how software licensing abuse can escalate into serious federal charges. Authorities…
Developers running local AI agents rarely expect a simple website visit to trigger a system compromise. The ClawJacked vulnerability changed that assumption. Researchers discovered that OpenClaw’s local gateway design allowed malicious websites to hijack AI agents running on a user’s machine. This flaw created a direct path between a browser tab and a powerful local…
Iran US cyber conflict has intensified alongside military escalation, bringing internet blackouts, cyberattacks, and a surge of misinformation. As tensions escalated between Washington and Tehran, digital infrastructure became a parallel battleground. Connectivity inside Iran dropped dramatically, while hacking activity and information manipulation increased across multiple platforms. The unfolding situation highlights how modern conflicts now combine…
APT37 hackers have deployed new malware to breach air-gapped networks, marking a significant escalation in targeted cyber espionage. Researchers uncovered a framework designed to infiltrate isolated systems by abusing removable media rather than relying on traditional internet connectivity. Air-gapped environments are commonly used in government, defense, and critical infrastructure sectors. These networks remain physically separated…
Resurge malware can remain dormant on Ivanti Connect Secure devices, according to a new warning from the U.S. Cybersecurity and Infrastructure Security Agency. The agency reports that the implant can persist silently inside compromised systems and activate only when it receives a specific remote connection trigger. This behavior increases the risk for organizations that believe…