Anthropic’s August report reveals hackers, North Korean operatives, and state actors misused its Claude AI for extortion, fraud, and espionage.
Anthropic’s August report reveals hackers, North Korean operatives, and state actors misused its Claude AI for extortion, fraud, and espionage.
Salt Typhoon hackers bypassed smash-and-grab tactics, infiltrating routers and surveillance systems to steal sensitive data and evade detection.
Microsoft says these Windows 11 out-of-box experience quality updates should help improve security and stability. This new system does come with a trade-off.
In a statement to TechRepublic, Apple also says the UK regulations threaten the security of its products.
Google Threat Intelligence Group shared its findings about a threat actor responsible for stealing Salesforce customer data via Salesloft Drift.
OneFlip could cause self-driving cars to crash, facial recognition systems to fail, and biometric ID authenticators to shut down.
Cisco Secure Workload is foundational for organizations seeking to implement an effective microsegmentation strategy. It empowers orgs to safeguard assets.
In June 2025, 107k unique customer email addresses were allegedly obtained from TheSqua.re, the “easiest way to find your next serviced apartment”. The data also included names, phone numbers and cities which were subsequently posted to a popular hacking forum. TheSqua.re did not respond to repeated attempts to disclose the incident, however multiple impacted HIBP subscribers confirmed the legitimacy and accuracy of the data.
Hackers are using fake voicemails and purchase orders to spread UpCrypter malware, giving them remote control over Windows systems worldwide.
Currently, developers who create “sideloaded” Android apps are exempt from Google’s verification requirements.