Cyber Defense Articles

Obscure MCP API in Comet Browser Breaches User Trust, Enabling Full Device Control via AI Browsers

19 Nov 2025 | Press Releases

PALO ALTO, Calif., November. 19, 2025, SquareX released critical research exposing a hidden API in Comet that allows extensions in the AI Browser to e...

Liquibase Secure, MongoDB Bring AI Governance to t...

19 Nov 2025 | Press Releases

Liquibase introduces new AI governance capabilitie..

MorganFranklin Cyber Makes Strategic Acquisition o...

19 Nov 2025 | Press Releases

MorganFranklin Cyber, a leading cybersecurity advi..

Secure.com Digital Intros Security Teammates to Br...

19 Nov 2025 | Press Releases

Dubai-based Secure.com has introduced Digital Sec..

Hacks

Hackers Actively Exploiting 7-Zip Symbolic Link–

19 Nov 2025 | info@thehackernews.com (The Hacker News)

A recently disclosed security flaw impacting 7-Zip

Python-Based WhatsApp Worm Spreads Eternidade Stea

19 Nov 2025 | info@thehackernews.com (The Hacker News)

Cybersecurity researchers have disclosed details o

Hackers Actively Exploiting 7-Zip Symbolic Link–

19 Nov 2025 | info@thehackernews.com (The Hacker News)

Python-Based WhatsApp Worm Spreads Eternidade Stea

19 Nov 2025 | info@thehackernews.com (The Hacker News)

WrtHug Exploits Six ASUS WRT Flaws to Hijack Tens

19 Nov 2025 | info@thehackernews.com (The Hacker News)

Application Containment: How to Use Ringfencing to

19 Nov 2025 | info@thehackernews.com (The Hacker News)

EdgeStepper Implant Reroutes DNS Queries to Deploy

19 Nov 2025 | info@thehackernews.com (The Hacker News)

ServiceNow AI Agents Can Be Tricked Into Acting Ag

19 Nov 2025 | info@thehackernews.com (The Hacker News)

Fortinet Warns of New FortiWeb CVE-2025-58034 Vuln

19 Nov 2025 | info@thehackernews.com (The Hacker News)

Sneaky 2FA Phishing Kit Adds BitB Pop-ups Designed

19 Nov 2025 | info@thehackernews.com (The Hacker News)

Do National Data Laws Carry Cyber-Risks for Large

19 Nov 2025 | Nate Nelson, Contributing Writer

Cloudflare Blames Outage on Internal Configuration

19 Nov 2025 | Elizabeth Montalbano, Contributing Writer

Critical Railway Braking Systems Open to Tampering

19 Nov 2025 | Nate Nelson, Contributing Writer

Google's Gemini 3 is living up to the hype and cre

19 Nov 2025 | Artificial Intelligence, Technology

Google Search is now using AI to create interactiv

19 Nov 2025 | Artificial Intelligence, Technology

Palo Alto Networks to acquire observability firm C

19 Nov 2025 | Money, Chronosphere

Five Eyes just made life harder for bulletproof ho

19 Nov 2025 | Commentary, Cybercrime

Amazon warns of global rise in specialized cyber-e

19 Nov 2025 | Cybersecurity, Research

The Cloudflare Outage May Be a Security Roadmap

19 Nov 2025 | A Little Sunshine, Latest Warnings

Yes, there exists $200 Android tablets that are ac

19 Nov 2025 | Adrian Kingsley-Hughes

Amazon is selling a $430 refurbished MacBook Pro t

19 Nov 2025 | Alison DeNisco Rayome

How to clear your MacBook cache (and why you shoul

19 Nov 2025 | Elyse Betters Picaro

Samsung Galaxy Buds 3 Pro vs. Apple AirPods Pro 3:

19 Nov 2025 | Christian de Looper

WhatsApp flaw allowed discovery of the 3.5 billion

19 Nov 2025 | Communications Security, Messaging Security, Network Security, Security, Vulnerabilities

The nexus of risk and intelligence: How vulnerabil

19 Nov 2025 | Security, Security Software, Threat and Vulnerability Management, Vulnerabilities

Hidden API in Comet AI browser raises security red

19 Nov 2025 | Browser Security, Endpoint Protection, Security

Datenpanne bei Eurofiber France

19 Nov 2025 | Cyberattacks, Cybercrime, Data Breach, Security

Behind the firewall: The hidden struggles of cyber

19 Nov 2025 | Careers, Diversity and Inclusion, Employee Experience, IT Management

Anthropic AI-powered cyberattack causes a stir

19 Nov 2025 | Artificial Intelligence, Cyberattacks, Cybercrime, Generative AI, Security

Security

Forget Dyson: This stick vacuum surpassed a skepti

19 Nov 2025 | Kayla Solino

After weeks of using the Roborock F25 Ultra, I can never go back to using basic cleaning tools.

Cyber Attack

WhatsApp flaw allowed discovery of the 3.5 billion

19 Nov 2025 | Communications Security, Messaging Security, Network Security, Security, Vulnerabilities

Researchers have uncovered a WhatsApp privacy flaw

The nexus of risk and intelligence: How vulnerabil

19 Nov 2025 | Security, Security Software, Threat and Vulnerability Management, Vulnerabilities

For years, I watched organizations treat vulnerabi

Hidden API in Comet AI browser raises security red

19 Nov 2025 | Browser Security, Endpoint Protection, Security

SquareX has disclosed a previously undocumented AP

Datenpanne bei Eurofiber France

19 Nov 2025 | Cyberattacks, Cybercrime, Data Breach, Security

PixelBiss – shutterstock.com

Cyber Attack

Forget Dyson: This stick vacuum surpassed a skepti

19 Nov 2025 | Kayla Solino

After weeks of using the Roborock F25 Ultra, I can

Hack News

Hackers Actively Exploiting 7-Zip Symbolic Link–

19 Nov 2025 | info@thehackernews.com (The Hacker News)

Python-Based WhatsApp Worm Spreads Eternidade Stea

19 Nov 2025 | info@thehackernews.com (The Hacker News)

WrtHug Exploits Six ASUS WRT Flaws to Hijack Tens

19 Nov 2025 | info@thehackernews.com (The Hacker News)