Fraudsters integrate ChatGPT into global scam campaigns
AI models are being folded into fraud and influence operations that follow long standing tactics. A February 2026 update to OpenAI’s Disrupting Malicious Uses of Our Models …
Telegram rises to top spot in job scam activity
Encrypted messaging platforms are becoming a primary channel for Authorised Push Payment (APP) fraud, with Telegram representing a growing share of reported cases, according …
Scattered Lapsus$ Hunters seeks women for vishing attacks
The Scattered Lapsus$ Hunters (SLH) hacking collective has launched a recruitment push aimed specifically at women, offering cash payments for participating in voice-phishing …
Samsung’s Galaxy S26 turns privacy into a visible and invisible feature
The Samsung Galaxy S26 series is out, offering plenty of security features that protect personal data while providing users with transparency and control over how their …
Anthropic acquires Vercept to expand the capabilities of AI computer use
Anthropic has acquired Vercept to help push Claude’s computer use capabilities further. People are using Claude for increasingly complex work, including writing and running …
Wireshark 4.6.4 resolves dissector flaws, plugin compatibility issue
Packet inspection remains a routine activity across enterprise networks, incident response workflows, and malware investigations. Continuous use places long-term stability and …
Lightrun brings live runtime context to AI site reliability engineering
Lightrun has announced real-time AI SRE built on live, in-line runtime context. This enables AI agents and engineering teams to dynamically generate missing evidence without …
Intellicheck Desktop Application helps organizations combat identity theft
Intellicheck announced the roll out of its enriched Desktop Application. The new Desktop Application allows any sized organization to immediately stop identity theft and fraud …
The $19.5 million insider risk problem
Routine employee activity across corporate systems carries an average annual cost of $19.5 million per organization. That figure comes from the 2026 Cost of Insider Risks …
APCON IntellaStore IV analyzes network traffic characteristics for further processing
Deploying the IntellaStore IV Network Security Appliance from APCON means easy installation, dedicated network packet capture, and a seamless workflow from traffic of interest …
Open-source security debt grows across commercial software
Open source code sits inside nearly every commercial application, and development teams continue to add new dependencies. Black Duck’s 2026 Open Source Security and Risk …
Review: Digital Forensics, Investigation, and Response, 5th Edition
Digital Forensics, Investigation, and Response, 5th Edition presents a structured survey of the digital forensics discipline. The book spans foundational principles, platform …
Featured news
Resources
Don't miss
- Why AI changed the threat model for travel technology
- AI red teaming agents change how LLMs get tested
- Verizon DBIR: Vulnerability exploitation is the dominant initial access vector
- TeamPCP breached GitHub’s internal codebase via poisoned VS Code extension
- Microsoft provides mitigation for “YellowKey” BitLocker bypass flaw (CVE-2026-45585)