The integration of AI-powered IoT devices for real-time diabetes monitoring represents a major healthcare breakthrough, but security experts warn these systems create new attack vectors. Recent implem...

The integration of AI-powered IoT devices for real-time diabetes monitoring represents a major healthcare breakthrough, but security experts warn these systems create new attack vectors. Recent implem...
A disturbing trend of AI-powered romance scams is emerging, with chatbots manipulating vulnerable individuals into fake relationships. Recent cases include seniors being financially exploited and emot...
Recent AI applications in healthcareβfrom ultrasound-based due date predictions to microplastic detectionβshow remarkable potential but introduce novel cybersecurity risks. As the NHS adopts AI to...
Amazon India is implementing robust compliance measures as it expands operations amid increasing regulatory scrutiny from Indian authorities. The e-commerce giant is enhancing its data protection fram...
AT&T has reached a $177 million settlement following multiple data breaches affecting millions of customers. Eligible individuals can now file claims for compensation ranging from $25 to $7,500, depen...
Cybercriminals are leveraging AI to create highly sophisticated Business Email Compromise (BEC) attacks, known as BEC 2.0. These next-generation scams use deepfake audio, AI-generated writing styles, ...
The growing trend of luxury smart home giveaways presents overlooked cybersecurity risks. This investigation reveals how high-value connected home prizes often lack proper security configurations, exp...
As AI adoption accelerates across industries, a dangerous gap is emerging between technological implementation and workforce security training. Manufacturers are deploying AI to address labor shortage...
A new wave of sophisticated one-tap phishing attacks is compromising Telegram accounts globally, with victims losing access instantly after clicking malicious links. This article examines the attack m...
The Philippines' Commission on Audit (COA) has ordered a fraud audit of Bulacan flood control projects following suspected financial irregularities. This investigation highlights critical vulnerabilit...
A major data breach at a Gurugram-based call center has led to a sophisticated βΉ2.6 crore (β$315,000) credit card fraud operation, resulting in 18 arrests. The incident reveals systemic vulnerabil...
A disturbing trend of AI-powered identity theft is targeting both celebrities and vulnerable populations. Recent cases include Italian actor Lino Banfi's voice cloned for cream advertisements, unautho...
Microsoft has launched an urgent internal investigation into allegations that its Azure cloud platform was used by Israeli military intelligence for mass surveillance of Palestinians. The probe follow...
A major data breach at a Gurugram-based call center has led to a sophisticated credit card fraud scheme totaling βΉ2.6 crore (approximately $315,000), resulting in 18 arrests. The incident exposes sy...
AT&T has reached a $177 million settlement over multiple data breaches affecting millions of customers. Eligible individuals can file claims for compensation up to $7,500, with payments varying based ...
WhatsApp is testing an AI-powered writing assistant feature that analyzes user messages to provide writing suggestions. While the tool promises to enhance communication, cybersecurity experts warn abo...
A growing queue of $3.7 billion in Ethereum awaiting unstaking is creating potential market instability and security concerns for staking protocols. With over 950,000 ETH currently in the exit queue, ...
The complete source code of ERMAC 3.0, a sophisticated Android banking trojan, has been leaked online due to a default password vulnerability. This leak provides cybercriminals with a ready-made toolk...
American Bitcoin, a Trump-backed mining company, is pursuing strategic acquisitions in Asia as part of an $882 million expansion plan, raising significant cybersecurity concerns. The company's aggress...
As institutional adoption of tokenized real-world assets (RWAs) accelerates with platforms like All InX's next-gen solution and S&P Dow Jones exploring tokenized indexes, new attack vectors are emergi...