Europol dismantles €460M crypto scam targeting 5,000 victims worldwide

Europol busted a crypto scam ring that laundered €460M from 5,000+ victims. Operation Borrelli involved Spain, the U.S., France, and Estonia. Europol has taken down a massive cryptocurrency fraud ring that scammed over 5,000 people worldwide, laundering around €460 million ($540 million). The international operation, dubbed Operation Borrelli, began in 2023 and was led by […]

Google Patches Critical Zero-Day Flaw in Chrome’s V8 Engine After Active Exploitation

Google has released security updates to address a vulnerability in its Chrome browser for which an exploit exists in the wild.
The zero-day vulnerability, tracked as CVE-2025-6554 (CVSS score: N/A), has been described as a type confusing flaw in the V8 JavaScript and WebAssembly engine.
“Type confusion in V8 in Google Chrome prior to 138.0.7204.96 allowed a remote attacker to perform arbitrary

Shoot the Hoot with CyberHoot …RAW – Episode 5

Welcome to Shoot the Hoot…RAW! Welcome back to Episode 5 of Shoot the Hoot—the weekly livestream hosted by Chuck Taylor, Co-Founder and Lead Developer at CyberHoot. If you think firewalls and fancy tools are all you need to stay secure, this episode might hurt a little (in the best way). This week, we’re diving headfirst … Read more

U.S. Arrests Key Facilitator in North Korean IT Worker Scheme, Seizes $7.74 Million

The U.S. Department of Justice (DoJ) on Monday announced sweeping actions targeting the North Korean information technology (IT) worker scheme, leading to the arrest of one individual and the seizure of 29 financial accounts, 21 fraudulent websites, and nearly 200 computers.
The coordinated action saw searches of 21 known or suspected “laptop farms” across 14 states in the U.S. that were put to

CISA and U.S. Agencies warn of ongoing Iranian cyber threats to critical infrastructure

U.S. warns of rising Iranian cyber threats exploiting outdated software and weak passwords, with attacks likely to escalate due to recent events. U.S. cybersecurity and intelligence agencies warn of rising cyber threats from Iranian state-linked hackers, expected to escalate. These actors typically exploit outdated software, known vulnerabilities, and weak or default passwords on internet-connected systems. […]

Privacy vs. Convenience: How IoT Could Invade Your Personal Life

The rise of Internet of Things (IoT) technology has brought unprecedented convenience to our daily lives, often in exchange for personal data.

The hidden cost of smart living

The Internet of Things (IoT) promises to bring a new level of convenience by streamlining many aspects of your day. Smart thermostats “learn” their owners’ schedules, refrigerators suggest shopping lists, and home security systems monitor properties while owners are away.

At first glance, it looks like a utopia of conve

The Rise of Agentic AI: Uncovering Security Risks in AI Web Agents

In our first post, we introduced the world of AI web agents – defining what they are, outlining their core capabilities, and surveying the leading frameworks that make them possible. Now, we’re shifting gears to look at the other side of the coin: the vulnerabilities and attack surfaces that arise when autonomous agents browse, click, […]

The post The Rise of Agentic AI: Uncovering Security Risks in AI Web Agents appeared first on Blog.

The Rise of Agentic AI: From Chatbots to Web Agents

Disclaimer: This post isn’t our usual security-focused content – today we’re taking a quick detour to explore the fascinating world of AI agents with the focus of AI web agents. Enjoy this educational dive as a warm-up before we get into the juicy details of AI web agents in our follow-up post where we will […]

The post The Rise of Agentic AI: From Chatbots to Web Agents appeared first on Blog.