WiFi sensing means WiFi networks are used for more than just data transmission – and that could pose risks for cybersecurity.

WiFi sensing means WiFi networks are used for more than just data transmission – and that could pose risks for cybersecurity.

As wireless technologies continue to evolve, WiFi networks are increasingly being utilized for more than mere data transmission. WiFi sensing harnesses existing WiFi signals to detect and interpret physical activities, presence, and even physiological states, all without the need for wearables or dedicated monitoring hardware. While the opportunities afforded by WiFi sensing are significant, especially in enhancing security and automation, this innovation also introduces new challenges for cybersecurity and privacy.
Israeli developed TeleMessage SGNL messaging app, widely adopted by U.S. government agencies, financial institutions, legal firms, is being exploited by malicious actors.

Israeli developed TeleMessage SGNL messaging app, widely adopted by U.S. government agencies, financial institutions, legal firms, is being exploited by malicious actors.

A critical vulnerability affecting TeleMessage SGNL, a secure enterprise messaging and compliance platform modeled after Signal, is currently being exploited by malicious actors. The flaw—tracked as CVE-2025-48927—allows unauthenticated attackers to access sensitive memory dumps containing highly confidential user data.
What is the best LLM for text, coding, vision, search, or X? LMArena knows, and the results may surprise you.

What is the best LLM for text, coding, vision, search, or X? LMArena knows, and the results may surprise you.

LMArena is a widely referenced platform that ranks large AI models across multiple areas—including text, coding, vision, and specialized tasks—using extensive human preference data. Its leaderboards reflect which models users find most capable in real-world tasks, based on head-to-head comparisons and live voting.
Hackers Leverage GitHub Repositories to Distribute Amadey Malware and Data Stealers, Bypassing Enterprise Filters

Hackers Leverage GitHub Repositories to Distribute Amadey Malware and Data Stealers, Bypassing Enterprise Filters

Recent cybersecurity intelligence has uncovered a significant trend: threat actors are now exploiting public GitHub repositories to host and disseminate the Amadey malware and various data-stealing tools. By leveraging the reputation and widespread access policies of GitHub, these attackers are successfully bypassing traditional web filters and security protocols in organizational networks.
Computer hacker with Android robot on desk

Google Files Lawsuit to Disrupt BadBox 2.0 Botnet Infecting Millions of Devices

Google has escalated its fight against cybercrime by filing a lawsuit in New York federal court, targeting the operators of the BadBox 2.0 botnet. This sophisticated malware campaign has compromised more than 10 million devices across the globe, making it one of the largest known networks of infected smart TV devices and other connected electronics.
Chinese state-backed threat actors target Taiwan’s semiconductor sector with Colbalt Strike and custom backdoors.

Chinese state-backed threat actors target Taiwan’s semiconductor sector with Colbalt Strike and custom backdoors.

Recent months have seen a significant escalation in cyber espionage campaigns targeting Taiwan’s vital semiconductor industry, attributed to Chinese state-backed threat actors. These sophisticated operations, reported from March through June 2025 and potentially ongoing, are believed to be aimed at acquiring proprietary technology, disrupting business operations, and gathering sector intelligence. The uptick in attacks aligns with China’s strategic drive for semiconductor self-sufficiency amid increasingly restrictive export controls imposed by the United States and its allies.
A sophisticated cyberattack campaign is actively exploiting a vulnerability in the Apache HTTP Server to deploy a cryptocurrency mining malware known as “Linuxsys.”

A sophisticated cyberattack campaign is actively exploiting a vulnerability in the Apache HTTP Server to deploy a cryptocurrency mining malware known as “Linuxsys.”

A sophisticated cyberattack campaign is actively exploiting a vulnerability in the Apache HTTP Server to deploy a cryptocurrency mining malware known as “Linuxsys.” Leveraging the CVE-2021-41773 flaw, attackers are compromising servers and covertly mining cryptocurrency, highlighting the risks posed by unpatched open-source software.
OpenAI, Anthropic, Meta, and Google researchers issue a joint warning about the potential loss of a critical AI safety feature that could cause AI to hide its true intentions and deliberately deceive.

OpenAI, Anthropic, Meta, and Google researchers issue a joint warning about the potential loss of a critical AI safety feature that could cause AI to hide its true intentions and deliberately deceive.

A united front of over 40 researchers from the world’s leading artificial intelligence organizations—OpenAI, Anthropic, Meta, and Google DeepMind—has issued a rare joint statement addressing urgent risks in the future of AI safety. These experts, typically rivals in the AI arms race, have sounded the alarm over the potential loss of a critical safety feature: the ability to monitor AI systems' inner reasoning, or "chain-of-thought."