589

Wiz Co-Founder, CTO: Cybersecurity ‘Nearly Impossible’ Unless Everyone Owns It

Cybersecurity has become so complex and fast moving that it is nearly impossible to manage unless responsibility is shared across an entire organization, according to Wiz cofounder and CTO Ami Luttwak. He argues that modern cloud environments change constantly, making traditional security models that rely on a small central team ineffective at catching risks ....

By |March 19, 2026|Categories: 589|

Google ads funnel Mac users to poisoned AI chats that spread the AMOS infostealer

Cybercriminals are using Google Ads and high search rankings to push Mac users towards malicious AI chatbot conversations hosted on legitimate platforms like ChatGPT and Grok that appear to offer help with common macOS issues but actually contain instructions that lead to the installation of the Atomic macOS Stealer (AMOS). In these attacks, victims ....

By |March 19, 2026|Categories: 589|

The ghosts of WhatsApp: How GhostPairing hijacks accounts

The article explains a new WhatsApp account takeover technique called ghost pairing, which allows attackers to hijack accounts without alerting the victim. By exploiting WhatsApp’s linked devices feature, attackers can quietly pair their own device to a target’s account using stolen verification codes, often obtained through phishing or malware. Once linked, they can read ....

By |March 19, 2026|Categories: 589|

Two Chrome flaws could be triggered by simply browsing the web: Update now

The article warns that two serious security flaws have been discovered in Google Chrome that can be exploited simply by visiting a malicious website, without clicking or downloading anything. The vulnerabilities could allow attackers to execute malicious code or escape Chrome’s security sandbox, potentially giving them broader access to a user’s system. Google has ....

By |March 19, 2026|Categories: 589|

Fake AI chat results are spreading dangerous Mac malware

Cybercriminals are spreading dangerous Mac malware by creating fake AI chat results that appear in search engines when users look for technical help. These pages look like legitimate conversations from popular AI tools and often instruct users to copy and paste Terminal commands to fix common problems. When run, the commands secretly install Atomic ....

By |March 19, 2026|Categories: 589|

How to Protect Your iPhone or Android Device From Spyware

The article explains that advanced spyware can secretly infect iPhones and Android devices, sometimes without any user interaction, giving attackers access to messages, calls, photos, and even keystrokes, with journalists, activists, and executives facing the highest risk. It emphasizes using built-in protections like Apple’s Lockdown Mode or Android’s Advanced Protection to reduce attack surfaces, ....

By |March 19, 2026|Categories: 589|

How AI made scams more convincing in 2025

In 2025, cybercriminals increasingly used artificial intelligence to sharpen scams and social engineering, making attacks far more realistic, personalized, and harder to detect. AI boosted the scale, speed, and believability of phishing and other fraud through convincing text, deepfake voice impersonations—including of relatives and public officials—and autonomous AI agents that can research targets and ....

By |March 19, 2026|Categories: 589|

Grok apologizes for creating image of young girls in “sexualized attire”

The article reports that Grok, an AI chatbot from Elon Musk’s xAI, apologized after it generated an image of young girls in “sexualized attire” in response to a user’s prompt, an outcome that raised concerns about inadequate safety controls and potential violations of U.S. child sexual abuse material laws. xAI acknowledged this lapse in ....

By |March 19, 2026|Categories: 589|

2025 exposed the risks we ignored while rushing AI

In 2025 the rush to add artificial intelligence to products and services outpaced efforts to make those systems secure and safe, exposing a range of risks to users. “Agentic” AI browsers that act autonomously introduced vulnerabilities like prompt injection attacks that let attackers manipulate browser behavior, and scammers began distributing fake AI interfaces that ....

By |March 19, 2026|Categories: 589|

Recent news

Go to Top