The new Soundcore Liberty 5 Pro Max are Anker'snew top-of-the-line ANChrs and also suitable as adictationmachine with AI functions. (Anchor, Audio)
Search
A vulnerability in Trump Mobile makes customer data freelyaccessible. Internal data also shows much lower sales figures. (Data leak, security breach)
There are security gaps in Trend Micro Apex One and Langflow that cybercriminals are actively attacking. CISA warns against this.
The Zero Trust Security Framework becomes the central guideline of modern IT security. Clear principles and an implementable implementation plan are crucial. An online workshop teaches practical procedures for this. (Golem career world, server applications)
The GTA-6 manufacturer mentions sales expectations, and investors react immediately: According to the new businessfigures, take-two shares are up significantly. (GTA 6, Red Dead Redemption)
For months, there have been little credible accusations in the US that WhatsApp can view completely encrypted content. Now Texas is filing a lawsuit.
Canadian authorities on Wednesday arrested a 23-year-old Ottawa man on suspicion of building and operating Kimwolf, a fast spreading Internet-of-Things botnet that enslaved millions of devices for use in a series of massive distributed denial-of-service (DDoS) attacks over the past six months. KrebsOnSecurity publicly named the suspect in February 2026 after the accused launched a volley of DDoS, doxing and swatting campaigns against this author and a security researcher. He now faces criminal h
Three firms will pay nearly $1 million for selling “Active Listening” technology that they claimed tapped people’s phones for advertising. The FTC alleges the “tech” was just pricey email lists.
Those who insert texts into AI chatbots often unintentionally pass on sensitive data. A new Chrome extension of the DFKI is intended to prevent this.
Samsung has averted an 18 ton strike. In return, around 125,000 employees receive a one-time bonus payment in enormous amounts. (Samsung, Business)
First VPN promised hackers complete anonymity for their cyberattacks. But Europol said it was able to notify the service’s users that they have now been identified.
Google has accidentally leaked details about an unfixed issue in Chromium that keeps JavaScript running in the background even when the browser is closed, allowing remote code execution on the device. [...]
Cloudflare now integrates with the Claude Compliance API, so that security teams can monitor Claude Enterprise activity directly in the Cloudflare Dashboard.
Vodafone's new chief technology officer explains why 5G Advanced is being brought into the mobile network, but the company is reluctant to do so with Docsis 4.0. By Achim Sawall (Vodafone, cable network)
Only for the second time: Amazon sells the 256 GB Lexar Play Pro MicroSD Express card for Switch 2 forless than 51 euros. (Storage media, Amazon)
Unit 42 analyzes npm supply chain evolution post-Shai Hulud. Discover wormable malware, CI/CD persistence, multi-stage attacks and more. The post The npm Threat Landscape: Attack Surface and Mitigations (Updated May 21) appeared first on Unit 42.
Apple revealed that it blocked over $11 billion in fraudulent App Store transactions over the last six years, more than $2.2 billion in potentially fraudulent App Store transactions in 2025 alone. [...]
Modern crypto drainers don't hack wallets. They trick users into approving malicious transactions. Flare explores how the Lucifer DaaS platform scales wallet theft through phishing and automation. [...]
A Chinese cyber-espionage campaign has been targeting telecommunications providers with newly discovered Linux and Windows malware dubbed Showboat and JFMBackdoor, respectively. [...]