Cyberwarfare
State-sponsored hackers love Gemini, Google says
PCWorld reports that Google's Threat Intelligence Group documented state-sponsored hackers from Russia, China, North Korea, and Iran exploiting Gemini AI for cyberattacks. These malicious actors leverage Gemini's capabilities for surveillance, target identification, vulnerability discovery, and debugging exploit code, including developing WinRAR exploits. Google restricts access for identified bad actors, but the report highlights AI's dual-use nature and emerging cybersecurity challenges. "AI" systems aren't just great for raising the price of your electronics, giving you wrong search results, and filling up your social media feed with slop.
- Asia > Middle East > Iran (0.29)
- Asia > China (0.28)
- Europe > Russia (0.27)
- (5 more...)
- Information Technology > Security & Privacy (1.00)
- Leisure & Entertainment > Games > Computer Games (0.59)
- Government > Military > Cyberwarfare (0.55)
AI is already making online swindles easier. It could get much worse.
AI is already making online swindles easier. It could get much worse. Some cybersecurity researchers say it's too early to worry about AI-orchestrated cyberattacks. Others say it could already be happening. Anton Cherepanov is always on the lookout for something interesting. And in late August last year, he spotted just that.
- North America > United States > New York (0.05)
- Asia > China (0.05)
- North America > United States > Virginia (0.04)
- (3 more...)
- Information Technology > Security & Privacy (1.00)
- Government > Military > Cyberwarfare (0.71)
- Information Technology > Security & Privacy (1.00)
- Information Technology > Communications > Social Media (1.00)
- Information Technology > Artificial Intelligence > Natural Language > Large Language Model (1.00)
- Information Technology > Artificial Intelligence > Machine Learning > Neural Networks > Deep Learning (0.70)
The best cheap VPN in 2026
You'll get the best VPN experience by paying, but prices don't have to be steep. When talking about the best VPNs, I frequently warn about the dangers of trusting free VPNs without verifying them. Although there are a few free VPNs worth recommending, many other free providers are ineffective, malicious or looking to profit off their users (or sometimes all three). Even the best free VPNs work a lot better once you subscribe and access their full service. This can be frustrating if you want to enjoy the benefits of a VPN but don't have the budget for yet another subscription.
- Information Technology > Security & Privacy (0.64)
- Government > Military > Cyberwarfare (0.40)
- Information Technology > Communications > Mobile (0.71)
- Information Technology > Artificial Intelligence (0.68)
Windscribe review: Despite the annoyances, it has the right idea
The first step is always to figure out how easy or hard the VPN is to use. Windscribe and other VPNs are important tools, but you'll never use them if the UI gets in the way. I tested Windscribe's desktop apps on Windows and Mac, its mobile apps on iOS and Android and its Chrome and Firefox browser extensions. To start with, let me say that installing Windscribe is a breeze no matter where you do it. The downloaders and installers handle their own business, only requiring you to grant a few permissions. The apps arrive on your system ready to use out of the box.
- North America > United States (0.68)
- Asia > Japan > Honshū > Kantō > Tokyo Metropolis Prefecture > Tokyo (0.14)
- Europe > Russia (0.05)
- (24 more...)
- Law (1.00)
- Information Technology > Security & Privacy (1.00)
- Media (0.96)
- (2 more...)
- Information Technology > Security & Privacy (1.00)
- Information Technology > Communications > Social Media (1.00)
- Information Technology > Communications > Mobile (0.89)
- (2 more...)
149 Million Usernames and Passwords Exposed by Unsecured Database
This "dream wish list for criminals" includes millions of Gmail, Facebook, banking logins, and more. The researcher who discovered it suspects they were collected using infostealing malware. A database containing 149 million account usernames and passwords--including 48 million for Gmail, 17 million for Facebook, and 420,000 for the cryptocurrency platform Binance --has been removed after a researcher reported the exposure to the hosting provider. The longtime security analyst who discovered the database, Jeremiah Fowler, could not find indications of who owned or operated it, so he worked to notify the host, which took down the trove because it violated a terms of service agreement. In addition to email and social media logins for a number of platforms, Fowler also observed credentials for government systems from multiple countries as well as consumer banking and credit card logins and media streaming platforms.
- North America > United States > California (0.05)
- North America > United States > Arizona (0.05)
- North America > Canada (0.05)
- (3 more...)
- Information Technology > Security & Privacy (1.00)
- Information Technology > Services (0.91)
- Government > Military > Cyberwarfare (0.30)
AI-Powered Disinformation Swarms Are Coming for Democracy
Advances in artificial intelligence are creating a perfect storm for those seeking to spread disinformation at unprecedented speed and scale. And it's virtually impossible to detect. In 2016, hundreds of Russians filed into a modern office building on 55 Savushkina Street in St. Petersburg every day; they were part of the now-infamous troll farm known as the Internet Research Agency . Day and night, seven days a week, these employees would manually comment on news articles, post on Facebook and Twitter, and generally seek to rile up Americans about the then-upcoming presidential election. When the scheme was finally uncovered, there was widespread media coverage and Senate hearings, and social media platforms made changes in the way they verified users.
- Asia > Russia (0.34)
- Asia > China (0.05)
- South America > Venezuela > Capital District > Caracas (0.04)
- (5 more...)
- Media > News (1.00)
- Information Technology > Security & Privacy (1.00)
- Government > Regional Government > North America Government > United States Government (0.70)
- Government > Military > Cyberwarfare (0.49)
Flaw in 17 Google Fast Pair audio devices could let hackers eavesdrop
Apple's Siri AI will be powered by Gemini Google said it provided its hardware partners with recommended fixes in September. Google told Engadget its affected Pixel Buds are already patched. Now would be a good time to update all your Bluetooth audio devices. On Thursday, reported on a security flaw in 17 headphone and speaker models that could allow hackers to access your devices, including their microphones. The vulnerability stems from a faulty implementation of Google's one-tap (Fast Pair) protocol .
- Information Technology > Security & Privacy (1.00)
- Government > Military > Cyberwarfare (0.41)
- Information Technology > Security & Privacy (1.00)
- Information Technology > Artificial Intelligence (1.00)
- Information Technology > Communications > Mobile (0.75)
UK scraps digital ID requirement for workers
Apple's Siri AI will be powered by Gemini The government still plans to fully transition to digital right-to-work checks by 2029. Protesters take part in a'No to Digital ID' demonstration. The UK government has backtracked on a plan to require all workers to have a digital ID following a backlash. It will no longer be mandatory to register with the digital ID program to prove one has the right to work in the country, as the reports. The government announced the now-scrapped digital ID requirement in September.
- Information Technology > Security & Privacy (0.69)
- Government > Military > Cyberwarfare (0.42)
- Information Technology > Artificial Intelligence (0.79)
- Information Technology > Security & Privacy (0.69)
- Information Technology > Communications > Mobile (0.36)
An Instagram data breach reportedly exposed the personal info of 17.5 million users
An Instagram data breach reportedly exposed the personal info of 17.5 million users As spotted by Malwarebytes, the alleged leak includes usernames, email addresses, phone numbers and more. If you received a bunch of password reset requests from Instagram recently, you're not alone. As reported by Malwarebytes, an antivirus software company, there was a data breach revealing the sensitive information of 17.5 million Instagram users. Malwarebytes added that the leak included Instagram usernames, physical addresses, phone numbers, email addresses and more. The company added that the data is available for sale on the dark web and can be abused by cybercriminals.
- Information Technology > Security & Privacy (1.00)
- Government > Military > Cyberwarfare (0.74)
Learning Robust Representations for Malicious Content Detection via Contrastive Sampling and Uncertainty Estimation
Hossain, Elias, Biswas, Umesh, Gudla, Charan, Parsa, Sai Phani
We propose the Uncertainty Contrastive Framework (UCF), a Positive-Unlabeled (PU) representation learning framework that integrates uncertainty-aware contrastive loss, adaptive temperature scaling, and a self-attention-guided LSTM encoder to improve classification under noisy and imbalanced conditions. UCF dynamically adjusts contrastive weighting based on sample confidence, stabilizes training using positive anchors, and adapts temperature parameters to batch-level variability. Applied to malicious content classification, UCF-generated embeddings enable multiple traditional classifiers to achieve more than 93.38% accuracy, precision above 0.93, and near-perfect recall, with minimal false negatives and competitive ROC-AUC scores. Visual analyses confirm clear separation between positive and unlabeled instances, highlighting the framework's ability to produce calibrated, discriminative embeddings. These results position UCF as a robust and scalable solution for PU learning in high-stakes domains such as cybersecurity and biomedical text mining.
- North America > United States > Nevada (0.04)
- North America > United States > Mississippi (0.04)
- North America > United States > Florida > Orange County > Orlando (0.04)
- Overview (0.68)
- Research Report (0.52)
- Information Technology > Security & Privacy (1.00)
- Health & Medicine (1.00)
- Government > Military > Cyberwarfare (0.34)