AI model poisoning is real and we need to be aware of it
Monday, February 16, 2026 by Richard Harris
On a clear night I set up my telescope in the yard and let the mount hum along while the camera gathers light from something distant and patient. The workflow is a ritual. Focus by eye until the airy disk tightens. Shoot test frames and watch the histogram. Capture darks, flats, and bias frames so the quirks of the sensor can be cleaned away later. That discipline is no...
Reused bitcoin addresses are quietly increasing quantum risk
Wednesday, February 4, 2026 by Brittany Hainzinger
Despite billions spent on blockchain improvements and security measures, crypto criminals still steal billions of dollars from the crypto ecosystem each year, and that didn`t change in 2025. In fact, with over $4 billion in total losses from hacks, fraud, scams, money laundering, and ransomware, 2025 was the worst year for crypto illicit activity ever recorded.
Howev...
AI generated scams and phishing in 2026
Monday, January 5, 2026 by Austin Harris
David Stonehill, CTO, NetLib Security offers his insight into what 2026 will hold for us in the way of AI scams.
By 2026, AI-generated scams and phishing will be virtually indistinguishable from legitimate apps, storefronts, and communications making detection alone unreliable. App developers will need to design for breach resilience using MFA, passkeys, AI-driven se...
Safe c plus plus proposal abandoned after community pushback
Tuesday, November 25, 2025 by Russ Scritchfield
In the ever-evolving landscape of software development, a significant effort to overhaul the C++ programming language for enhanced safety has come to an abrupt halt. The Safe C++ proposal, which sought to introduce a memory-safe subset of the language inspired by the guarantees found in newer languages like Rust, has been abandoned by its lead author. This development o...
Airline data breach hits WestJet exposing over 1M passengers
Thursday, October 30, 2025 by Russ Scritchfield
Canada’s second-largest airline, WestJet, disclosed that a data breach earlier this year compromised the personal information of approximately 1.2 million passengers. The airline reported the incident in a filing with Maine’s attorney general, confirming that 240 residents in the state were affected.
Details of the information compromised
The informati...
Nvidia results highlight AI's strength as stocks hit records
Monday, October 20, 2025 by Austin Harris
Nvidia has reported earnings and revenues that exceeded analysts’ expectations, with sales guidance of $54 billion for the current quarter. The results underscore the ongoing expansion of infrastructure driven by artificial intelligence, as demand for AI-powered computing continues to accelerate.
The company’s earnings announcement arrived as the S&P ...
Ludo.ai Debuts sprite generator for instant 2D animation creation
Friday, October 17, 2025 by Richard Harris
Ludo.ai has launched Sprite Generator, a tool designed to simplify the creation of animated sprites for 2D games. The platform allows developers to generate engine-ready sprites from text prompts or existing 2D assets, producing downloadable sprite sheets compatible with game engines such as Unity, Godot, and GameMaker. By automating aspects of the animation pipeline, S...
Russian airport hacked as St. Petersburg website reports cyberattack
Monday, October 6, 2025 by Trey Abbe
Pulkovo airport, the primary international gateway for St. Petersburg, reported that its official website had been compromised in a cyberattack. The airport serves millions of passengers annually, making secure digital operations essential for timely flight information and passenger services. Officials confirmed that the attack temporarily disrupted access to the websit...
Phishing sites seized by Microsoft in major crackdown
Tuesday, September 23, 2025 by Richard Harris
Microsoft has intensified its efforts to combat cybercrime by targeting Raccoon0365, a subscription-based phishing service that enabled wide-scale credential theft. Working through the U.S. District Court in Manhattan, the company successfully obtained approval to seize nearly 340 internet domains associated with fraudulent login pages.
The campaign represents one of...
Push for FTC to Investigate Microsoft
Monday, September 22, 2025 by Austin Harris
U.S. Senator Ron Wyden has formally requested the Federal Trade Commission to examine Microsoft for what he describes as significant cybersecurity shortcomings. The request cites repeated security incidents and raises questions about the company’s role in safeguarding critical infrastructure.
Senator highlights cybersecurity risks
In a letter addressed to FT...
Salesforce data breach linked to Tenable via Salesloft Drift
Friday, September 12, 2025 by Richard Harris
A recent Salesforce data breach involving the Salesloft Drift integration has affected multiple organizations, including cybersecurity company Tenable. The company confirmed that limited customer contact and support case data were exposed but emphasized that no core product data was compromised.
Scope of exposed information
Tenable reported that information access...
Hackers steal cryptocurrency using fake job offers report reveals
Tuesday, September 9, 2025 by Trey Abbe
A recent investigation reveals that North Korean hacking groups are using elaborate fake job offers to steal cryptocurrency from blockchain professionals and investors. The scams, identified in a joint report by cybersecurity firms SentinelOne and Validin, include posing as recruiters for major crypto companies and directing applicants to download malicious software or ...
Salesforce breach let hackers steal Google customer data
Monday, August 25, 2025 by Richard Harris
In June, one of Google’s corporate Salesforce instances was affected by activity consistent with the UNC6040 campaign described in the post. Google responded by conducting an impact analysis and implementing mitigation steps. The affected instance stored contact information and related notes for small and medium-sized businesses. Investigators confirmed that data ...
Network API revenue to exceed 8 billion by 2030
Wednesday, August 20, 2025 by Austin Harris
A new study from Juniper Research, the foremost experts in telecommunications and connectivity markets, has found operator revenue from network Application Programming Interfaces (APIs) globally will exceed $8 billion by 2030. This is a substantial increase from the $284 million operators are forecasted to generate in 2025; with Juniper Research identifying KYC as key t...
GitHub Copilot surpasses 20M users
Monday, August 18, 2025 by Austin Harris
Microsoft Corporation wrapped up its fiscal year 2025 on an exceptionally strong note, delivering robust growth across cloud, AI, productivity, and consumer services. The tech giant reported a 24% year-over-year jump in net income for the fourth quarter, amounting to $27.2 billion, while revenue for the same period reached $76.4 billion, an 18% increase. These results u...
ChatGPT agents bridging research and action
Tuesday, August 12, 2025 by Austin Harris
You can now ask ChatGPT to handle requests like “look at my calendar and brief me on upcoming client meetings based on recent news,” “plan and buy ingredients to make Japanese breakfast for four,” and “analyze three competitors and create a slide deck.” ChatGPT will intelligently navigate websites, filter results, prompt you to log in...
Microsoft at Black Hat USA 2025
Monday, August 11, 2025 by Russ Scritchfield
Microsoft will participate in Black Hat USA 2025, scheduled for August 5-7 in Las Vegas, offering attendees a practitioner-driven experience centered on real-world threat intelligence, incident response, and applied AI expertise. The company emphasizes that cybersecurity is most effective when intelligence, tools, and domain expertise are tightly integrated. To that end...
Google OOS Rebuild announced
Friday, August 8, 2025 by Austin Harris
Google has unveiled OSS Rebuild, a new initiative aimed at enhancing trust and transparency across open source package ecosystems. As software supply chain attacks continue to threaten widely-used dependencies, OSS Rebuild offers a scalable and low-friction solution that supports reproducible builds, independent verification, and provenance generation, all without burde...
Raidiam research reveals API security risks
Thursday, August 7, 2025 by Austin Harris
A new report from Raidiam, a global leader in secure API access management, has uncovered an API security crisis hiding in plain sight: 84% of enterprises operating outside regulated environments have API security protections that fall dangerously short of what’s needed given the sensitivity of the data they expose.
The report, Helping ...
KNP ransomware attack
Wednesday, August 6, 2025 by Russ Scritchfield
One of the UK's oldest transport companies, KNP Logistics Group, collapsed under the weight of a ransomware attack that began with a single guessed password. The company, founded in 1865 and known primarily through its “Knights of Old” fleet, had survived world wars, economic upheavals, and generational shifts in the freight industry. But it could not su...
Your AI chat isn't safe
Monday, August 4, 2025 by Austin Harris
ChatGPT users are facing unexpected privacy risks as shared conversations with the AI tool have started appearing in Google search results. The issue stems from ChatGPT’s “shared link” feature, which allows users to generate public URLs for individual conversations. While the feature was originally intended for collaboration, those shared URLs are now ...
CoinDCX launches bounty after security breach
Friday, August 1, 2025 by Richard Harris
CoinDCX, one of the largest cryptocurrency exchanges in India, has issued an official statement following a sophisticated security incident on July 19, 2025, which affected one of its internal operational accounts used solely for liquidity provisioning on a partner exchange. The company emphasized that no customer funds were impacted and that all assets remain secure in...
Microsoft SharePoint hit by widespread zero-day attacks
Wednesday, July 30, 2025 by Austin Harris
The Cybersecurity and Infrastructure Security Agency (CISA) has reported active exploitation of a newly identified remote code execution (RCE) vulnerability affecting on-premise Microsoft SharePoint servers. The vulnerability, cataloged as CVE-2025-53770, is a variant of the previously known CVE-2025-49706 and presents significant risks to organizations by enabling unau...
iOS fitness app Fitify exposes 138K user private photos
Friday, July 25, 2025 by Austin Harris
Fitify’s publicly accessible Google cloud storage bucket has exposed hundreds of thousands of files. Some of the files were user-uploaded progress pictures that individuals upload to track their body changes over time. After Cybernews contacted the company, the unprotected instance was closed.
iOS fitness app Fitify exposes 138K user private photos: Key takeawa...
Donky Kong Bananza developer interview
Thursday, July 24, 2025 by Austin Harris
In the 19th volume of Nintendo’s Ask the Developer interview series, where creators share the company’s thoughts and development details in their own words, the spotlight turns to the team behind Donkey Kong Bananza, the Nintendo Switch 2 game. (Translated from the original Japanese. This interview was conducted before the game’s release.)
Donky Kon...
Jack Dorsey unveils Sun Day
Tuesday, July 22, 2025 by Austin Harris
Jack Dorsey, known globally as the co-founder of Twitter and CEO of Block, has been on a creative tear lately, launching back-to-back experimental apps. The latest addition to his portfolio is Sun Day, a simple yet intriguing app aimed at helping users track their sun exposure, monitor UV levels, and estimate vitamin D synthesis, all from their smartphones.
Available...
NIKKE returns to Anime Expo 2025
Sunday, July 13, 2025 by Austin Harris
Level Infinite recently announced that GODDESS OF VICTORY: NIKKE, the acclaimed sci-fi RPG shooter, is returning to Anime Expo 2025 in Los Angeles with its largest and most immersive showcase to date. Coinciding with the event, the highly anticipated NieR:Automata Collaboration Rerun also launches across PC and mobile platforms, bringing fan-favorite characters, mi...
2025 Artifact Management Report
Thursday, July 10, 2025 by Richard Harris
The 2025 Artifact Management Report arrives at a moment of profound change for software development teams worldwide. As organizations grapple with unprecedented security challenges, rapid AI adoption, and complex software supply chains, this year’s findings expose the critical gaps and evolving expectations surrounding artifact management. With software now the ba...
Index Engines wins prestigious industry recognitions
Wednesday, June 11, 2025 by Austin Harris
Cyber Resilience company Index Engines, announced that it received two major industry honors for its flagship product, CyberSense, recognizing the company’s innovation and impact in the cybersecurity space.
Index Engines received the 2025 Fortress Cybersecurity Award in the "Artificial Intelligence - Product or Service" category and was named a S...
iOS sleep app leaked sensitive user information
Tuesday, May 27, 2025 by Austin Harris
An iPhone app designed to combat insomnia, Sleep Journey: Insomnia Helper, exposed tens of thousands of users, revealing their names, alcohol habits, and other private data.
Stress is hardly a cure for insomnia. Meanwhile, an iOS app meant to help users fall asleep could become a headache instead. The Cybernews research team discovered that Sleep Journey: Insomnia He...
DataKrypto launches new AI models
Friday, May 9, 2025 by Richard Harris
DataKrypto launched a new solution that protects AI models and the data of businesses using them. Based on the company’s patented FHE technology, the solution, FHEnom for AI, addresses a critical security gap and delivers unprecedented AI protection.
FHEnom for AI is a zero-knowledge framework that safeguards both customized open-source AI models (adapted for s...
Diablo 4 How to Get Piranhado
Friday, May 2, 2025 by Richard Harris
Diablo 4 has so many devastating abilities, especially regarding class skills; one is Piranhado, which translates to a whirlpool of water filled with deadly piranhas that devour anything within seconds. Apart from its mobility and visually stunning animation combo, it is strategic at its root. Whether you're a veteran Nephalem or a newbie starting at Sanctuary, mast...
Universities fighting cybercrime with students
Thursday, April 24, 2025 by Richard Harris
Universities, one of the most popular targets for cybercriminals, are employing a new tool in the fight against cybercrime, their own students.
Over the past few years, universities and colleges around the U.S. have been increasingly hiring students and training them to become analysts in their security operations centers, known as SOCs. Students work alongside...
Linea expands through DeFi
Monday, April 7, 2025 by Richard Harris
Continuing its strategic expansion throughout the DeFi space, 1inch, a decentralized exchange aggregator that powers 100 million trades and $500 billion in volume, is partnering with Linea, Consensys' premiere zkEVM Layer-2 network. This integration provides users with hundreds of millions in liquidity, up to 16.6x lower transaction costs, and 6x faster processing c...
Security trade-offs and Xs vulnerabilities
Friday, March 21, 2025 by Richard Harris
The latest cyberattack on X raises an important question: Was this an external attack or a result of internal instability? While hacktivist group Dark Storm has claimed responsibility for the distributed denial-of-service (DDoS) attack, it is just as crucial to examine X’s own security posture, particularly in light of the drastic staffing cuts that followed Elon ...