A cybersecurity researcher has discovered a significant security lapse involving sensitive adoption records.

A cybersecurity researcher has discovered a significant security lapse involving sensitive adoption records.

Cybersecurity researcher Jeremiah Fowler has discovered a significant security lapse involving sensitive adoption records. Fowler identified an unprotected, publicly accessible database belonging to a prominent U.S. adoption agency. The database, left online without password protection or encryption, presented a major privacy risk to thousands of individuals involved in adoption cases.
GhostContainer targets Microsoft Exchange servers of high-value targets across Asia.

GhostContainer targets Microsoft Exchange servers of high-value targets across Asia.

A newly identified threat, known as GhostContainer, has emerged as a significant cybersecurity risk, targeting Microsoft Exchange servers belonging to high-value organizations across Asia. Discovered by security researchers in mid-2025, GhostContainer demonstrates sophisticated techniques designed to evade detection, persist within victim environments, and facilitate long-term data compromise—raising serious concerns for governmental and high-tech sectors in the region.
Computer hacker holding up cash

Empirical Security secures $12 million in seed funding for the development of an AI-driven vulnerability management system.

Empirical Security, an emerging innovator in cybersecurity, has secured $12 million in seed funding to accelerate its development of artificial intelligence-driven vulnerability management solutions. The round was led by Costanoa Ventures, with additional support from DNX Ventures, Sixty Degree Capital, and a host of prominent industry figures—including the founder of Intrigue (acquired by Google/Mandiant), creators of the Verizon Data Breach Investigations Report, and former executives from Qualys and Google.
Oracle releases 309 patches for nearly 200 distinct vulnerabilities in July 2025 Critical Patch Update (CPU).

Oracle releases 309 patches for nearly 200 distinct vulnerabilities in July 2025 Critical Patch Update (CPU).

Oracle has issued its July 2025 Critical Patch Update (CPU) on time, providing important security improvements for customers globally and raising the issue of when disclosure might become a source of embarrassment. This latest quarterly update addresses nearly 200 distinct vulnerabilities, with a total of 309 individual security patches spanning an extensive array of Oracle products.
Researchers dissect mobile forensics tool, Massistant, which is used by Chinese law enforcement to extract data from smartphones.

Researchers dissect mobile forensics tool, Massistant, which is used by Chinese law enforcement to extract data from smartphones.

Recent research has shed light on Massistant, a sophisticated mobile forensics application reportedly employed by Chinese law enforcement agencies to extract extensive digital data from mobile devices. Developed by Meiya Pico—now operating as SDIC Intelligence Xiamen Information Co., Ltd.—Massistant represents the latest evolution in China’s state-operated mobile surveillance capabilities.
Cambodia lets loose the cannons on human trafficking, arresting more than 1,000 in large-scale operation targeting cybercrime rings across the country.

Cambodia lets loose the cannons on human trafficking, arresting more than 1,000 in large-scale operation targeting cybercrime rings across the country.

In a decisive move against rampant online fraud, Cambodian authorities have arrested more than 1,000 individuals in a large-scale operation targeting cybercrime rings across the country. The coordinated raids, which took place over several days in mid-July 2025, followed a directive from Prime Minister Hun Manet emphasizing the urgent need to safeguard national security and public order amid a surge of technology-enabled scams.
BADBOX 2.0 malware variant targets Android IoT devices globally with more than 1 million devices compromised across 222 countries.

BADBOX 2.0 malware variant targets Android IoT devices globally with more than 1 million devices compromised across 222 countries.

A new and highly sophisticated malware variant known as BADBOX 2.0 has emerged as a major cybersecurity threat, targeting Android-based Internet of Things (IoT) devices globally. Researchers estimate that over one million devices have been compromised across 222 countries and territories, highlighting vulnerabilities in the international technology supply chain.