Google announces a major upgrade to Chrome’s security features on Android.

Google announces a major upgrade to Chrome’s security features on Android.

Google has announced a significant upgrade to Chrome’s security capabilities on Android, particularly for users enrolled in its Advanced Protection Program. With the latest updates in Android 16 and Chrome 137+, Google is bringing desktop-class security features to mobile devices, aiming to provide robust protection for high-risk individuals and anyone seeking maximum online safety.
Nippon Steel says data breach was tracked to hackers exploiting a previously unknown zero-day vulnerability.

Nippon Steel says data breach was tracked to hackers exploiting a previously unknown zero-day vulnerability.

Nippon Steel Solutions Corporation (NSSOL), a leading IT services subsidiary of Nippon Steel, has disclosed a significant data breach resulting from a sophisticated cyberattack. The incident, which came to light in early March 2025, was traced to hackers exploiting a previously unknown zero-day vulnerability in the company’s network equipment.
Researchers reveal severe vulnerabilities in Ruckus Networks platforms that remain unpatched, leaving networks at risk.

Researchers reveal severe vulnerabilities in Ruckus Networks platforms that remain unpatched, leaving networks at risk.

Critical security vulnerabilities have been identified in Ruckus Networks’ flagship management platforms, Virtual SmartZone (vSZ) and Ruckus Network Director (RND). Despite the severity of these flaws, no official patches have been released, leaving enterprise and public sector networks at significant risk.
Computer hacker holding a large metal lock and key

AiLock ransomware guide – mechanisms, infection vectors, and proven defense strategies.

AiLock ransomware has rapidly emerged as a significant cybersecurity threat in 2025, targeting both organizations and individuals with sophisticated encryption tactics and disruptive capabilities. Here we give you an in-depth look at AiLock’s mechanisms, infection vectors, and—most importantly—proven strategies for defending against this evolving menace.
Marks and Spencer (M&S) reveals recent cyberattack was a sophisticated impersonation attack against a third-party supplier network.

Marks and Spencer (M&S) reveals recent cyberattack was a sophisticated impersonation attack against a third-party supplier network.

Marks & Spencer (M&S) confirmed that its recent ransomware incident was the result of a highly sophisticated impersonation attack targeting its third-party supplier network. The breach ultimately enabled the deployment of the notorious DragonForce ransomware, causing significant disruption to the company’s operations and impacting millions of customers.
Samsung announces major security and privacy updates for upcoming Galaxy smartphones.

Samsung announces major security and privacy updates for upcoming Galaxy smartphones.

Samsung Electronics has unveiled a comprehensive suite of security and privacy upgrades for its upcoming Galaxy smartphones. These enhancements will be introduced with the launch of One UI 8, Samsung’s latest software interface based on Android 16, and are designed to address the evolving landscape of mobile threats while supporting the company’s expanding portfolio of AI-powered features.
A newly discovered vulnerability, Count(er) Strike, enables unauthorized users to extract sensitive data from the widely used ServiceNow service management suite.

A newly discovered vulnerability, Count(er) Strike, enables unauthorized users to extract sensitive data from the widely used ServiceNow service management suite.

A newly discovered vulnerability in ServiceNow, dubbed "Count(er) Strike, allows low-privileged—and in some cases, unauthenticated—users to extract sensitive data from ServiceNow tables, even when they should have no access to that information. With thousands of organizations relying on ServiceNow for workflow automation and sensitive business processes, the potential impact is especially concerning.
A New Android vulnerability, TapTrap, bypasses Android protections using an ingenious invisible user interface.

A New Android vulnerability, TapTrap, bypasses Android protections using an ingenious invisible user interface.

A newly uncovered Android vulnerability, dubbed TapTrap, is raising concerns among cybersecurity experts for its ability to bypass Android’s permission system using a highly deceptive invisible user interface (UI) technique. This attack, developed by researchers at TU Wien and the University of Bayreuth, leverages UI animations to trick users into performing sensitive actions—such as granting permissions or even wiping their devices—without their knowledge.