CometJacking: One Click Can Turn Perplexitys Comet AI Browser Into a Data Thief
Oct 04, 2025Ravie LakshmananAgentic AI / Enterprise Security Cybersecurity researchers have disclosed details of a new attack called CometJacking targeting
New CometJacking Attack Let Attackers Turn Perplexity Browser Against You in One Click
A groundbreaking cybersecurity vulnerability has emerged that transforms Perplexity’s AI-powered Comet browser into an unintentional collaborator for data theft. Security
Hackers steal identifiable Discord user data in third-party breach
Hackers stole partial payment information and personally identifying data associated with some Discord users after compromising a third-party customer service
Scanning Activity on Palo Alto Networks Portals Jump 500% in One Day
Oct 04, 2025Ravie LakshmananVulnerability / Network Security Threat intelligence firm GreyNoise disclosed on Friday that it has observed a spike
Discord Data Breach Customers Personal Data and Scanned Photo IDs leaked
A data breach at a third-party customer service provider has exposed the personal data of some Discord users, including names,
Opera wants you to pay $19.90 per month for its new AI browser
Opera Neon is a new browser that puts AI in control of your tabs and browsing activities, but it’ll cost
Detour Dog Caught Running DNS-Powered Malware Factory for Strela Stealer
A threat actor named Detour Dog has been outed as powering campaigns distributing an information stealer known as Strela Stealer.
Signal adds new cryptographic defense against quantum attacks
Signal announced the introduction of Sparse Post-Quantum Ratchet (SPQR), a new cryptographic component designed to withstand quantum computing threats. SPQR
Top 10 Best Supply Chain Intelligence Security Companies in 2025
The digital world continues to face growing threats around software vulnerabilities, data breaches, and cyber supply chain attacks. As companies
Rhadamanthys Stealer Evolves: Adds Device Fingerprinting, PNG Steganography Payloads
The threat actor behind Rhadamanthys has also advertised two other tools called Elysium Proxy Bot and Crypt Service on their
New Android Spyware Attacking Android Users Mimic as Signal and ToTok Apps
In recent months, security teams have observed a surge in Android spyware campaigns that prey on privacy-conscious users by masquerading
Threat Actors Pose as Government Officials to Attack Organizations with StallionRAT
In recent months, a sophisticated campaign dubbed Cavalry Werewolf has emerged, targeting government and critical infrastructure organizations across Russia and