209
120
219
New Somalia e-visa security flaw puts personal data of thousands at risk
Al Jazeera finds Somaliaβs electronic visa website lacks proper security, allowing anyone to download sensitive data.
231
Tech provider for NHS England confirms data breach
U.K.-based healthcare tech provider DXS International said it discovered and contained a data breach on Sunday. A ransomware gang took credit for the breach.
109
Chinaβs AI has hacked the West β we gave them the keys
The West handed China the advantage, and now we will suffer.
109
North Korean hackers stole a record $2 billion of crypto in 2025, Chainalysis says
North Korea-linked hackers drove a record year for crypto thefts, favoring rare but massive attacks on centralized services, led by Bybitβs $1.4 billion breach.
208
Improve your cybersecurity for just $10 with this VPN deal
Take your cybersecurity more seriously in 2026 with this 5-year subscription to AdGuard VPN, on sale now for $49.99 (reg. $359.40).
323
Penetration Testing of Agentic AI: A Comparative Security Analysis Across Models and Frameworks
arXiv:2512.14860v1 Announce Type: new
Abstract: Agentic AI introduces security vulnerabilities that traditional LLM safeguards fail to address. Although recent work by Unit 42 at Palo Alto Networks demonstrated that ChatGPT-4o successfully executes attacks as an agent that it refuses in chat mode, β¦
Abstract: Agentic AI introduces security vulnerabilities that traditional LLM safeguards fail to address. Although recent work by Unit 42 at Palo Alto Networks demonstrated that ChatGPT-4o successfully executes attacks as an agent that it refuses in chat mode, β¦
230
Cybersecurity skills in new graduates: a Philippine perspective
arXiv:2512.14778v1 Announce Type: new
Abstract: This study investigates the key skills and competencies needed by new cybersecurity graduates in the Philippines for entry-level positions. Using a descriptive cross-sectional research design, it combines analysis of job listings from Philippine onlinβ¦
Abstract: This study investigates the key skills and competencies needed by new cybersecurity graduates in the Philippines for entry-level positions. Using a descriptive cross-sectional research design, it combines analysis of job listings from Philippine onlinβ¦
213
Beyond Jailbreak: Unveiling Risks in LLM Applications Arising from Blurred Capability Boundaries
arXiv:2511.17874v2 Announce Type: replace
Abstract: LLM applications (i.e., LLM apps) leverage the powerful capabilities of LLMs to provide users with customized services, revolutionizing traditional application development. While the increasing prevalence of LLM-powered applications provides usersβ¦
Abstract: LLM applications (i.e., LLM apps) leverage the powerful capabilities of LLMs to provide users with customized services, revolutionizing traditional application development. While the increasing prevalence of LLM-powered applications provides usersβ¦
234
ShinyHunters claims theft of Pornhub Premium user data in extortion attempt
Infamous hacking group ShinyHunters has claimed responsibility for the theft of a large dataset tied to Pornhub Premium users, threatening to leak or sell the information unless the company pays a ransom. The hack of PornHub was first revealed by the adult video website on Dec. 12, which it describeβ¦
111
Beyond antivirus: Why anti-scam tech is now your digital must-have
Antivirus helps keep your devices safe. Anti scam tech helps keep your decisions safe. Both matter in a digital world where trickery is quick, clever, and absolutely everywhere.
111
Hacker Group Extorts Pornhub Over Premium User Data
If you can't trust a porn site with your credit card, who can you trust?
222
Top data protection software vendors for business in 2026
Data compromises carry real financial risk to organizations. It's imperative to invest in the right multifunctional data protection software that ensures security.
221
Cisco says Chinese hackers are exploiting its customers with a new zero-day
Cisco said it discovered a Chinese hacking campaign targeting its customers by exploiting a zero-day in some of the company's most popular products.
111
Stability-Drift Early Warning for Cyber-Physical Systems Under Degradation Attacks
arXiv:2512.13767v1 Announce Type: new
Abstract: Cyber-physical systems (CPS) such as unmanned aerial vehicles are vulnerable to slow degradation that develops without causing immediate or obvious failures. Small sensor biases or timing irregularities can accumulate over time, gradually reducing staβ¦
Abstract: Cyber-physical systems (CPS) such as unmanned aerial vehicles are vulnerable to slow degradation that develops without causing immediate or obvious failures. Small sensor biases or timing irregularities can accumulate over time, gradually reducing staβ¦