WhatsApp may let users chat by username instead of sharing phone numbers
WhatsApp is testing a username system that could let people start chats without exposing their phone number to new contacts. Right now, the feature appears…
WhatsApp is testing a username system that could let people start chats without exposing their phone number to new contacts. Right now, the feature appears…
Amazon Web Services has published an important security bulletin for Research and Engineering Studio, or RES, covering three vulnerabilities that could let an authenticated attacker…
]A newly disclosed jailbreak technique called sockpuppeting can push some major AI models past their safety guardrails by abusing assistant prefills. Trend Micro says the…
A new Magecart campaign has compromised 99 Magento stores by hiding the skimmer inside a tiny inline SVG element on checkout pages. Sansec says the…
A high-severity vulnerability in React Server Components can let remote attackers trigger denial-of-service conditions by sending specially crafted HTTP requests to Server Function endpoints. The…
DesckVB RAT is a remote access trojan that uses layered scripting, fileless loading, and process injection to avoid many traditional defenses. Point Wild’s LAT61 team…
Juniper Networks has disclosed a critical flaw in its Support Insights Virtual Lightweight Collector that can let an unauthenticated attacker take full control of the…
A fake OpenVSX extension that impersonates WakaTime can infect multiple VS Code-based editors on the same machine, not just the one where a developer installs…
Anyone who downloaded CPU-Z or HWMonitor from CPUID around April 9 to April 10, 2026 should treat that installer as suspicious. CPUID now says attackers…
TP-Link has disclosed five security vulnerabilities affecting the Archer AX53 v1.0 router, including command injection, buffer overflow, and arbitrary file read flaws. The company says…