Sign Up to Our Newsletter

Be the first to know the latest tech updates

[mc4wp_form id=195]
Uhale digital picture frames are secretly installing malware on boot, exposing home networks and personal data globally to hackers
Tech News

Uhale digital picture frames are secretly installing malware on boot, exposing home networks and personal data globally to hackers

Experts flag Uhale devices download malicious software automatically each time it boots up Seventeen security issues discovered across the tested digital picture frame models Major flaws include insecure TrustManager implementations and unsanitized filenames Security researchers have identified critical risks in Uhale-branded digital picture frames, revealing many devices download malicious software immediately after boot. Mobile security […]

JSON services hijacked by North Korean hackers to send out malware
Tech News

JSON services hijacked by North Korean hackers to send out malware

Lazarus Group used JSON storage services to host malware in the Contagious Interview campaign targeting developers Attackers lured victims via fake LinkedIn job offers, delivering BeaverTail, InvisibleFerret, and TsunamiKit malware Malware exfiltrates data, steals crypto, and mines Monero—while blending into normal dev workflows North Korean state-sponsored threat actors, part of the infamous Lazarus Group, have […]

Hackers hijacked antivirus features to install malware – here’s what we know
Tech News

Hackers hijacked antivirus features to install malware – here’s what we know

CVE-2025-12480 in Triofox allowed zero-day exploitation via improper access control UNC6485 attackers deployed Zoho Assist, AnyDesk, and SSH tunneling for remote access Patch released July 26; newer Triofox version available October 14 for mitigation Popular remote file sharing and collaboration platform Triofox carried a critical vulnerability that was exploited as a zero-day used to deploy […]

SonicWall blames state hackers for damaging data breach
Tech News

SonicWall blames state hackers for damaging data breach

SonicWall confirms state-sponsored actor accessed cloud backups via API in a targeted breach Initially downplayed, the breach ultimately affected all SonicWall customers globally No product or firmware compromise occurred; Mandiant is assisting with remediation and hardening SonicWall has blamed “state-sponsored threat actors” for the cloud backup security breach which hit its services in September 2025. […]

Microsoft Teams really could be bad for your (security) health – hackers spoof bosses, send fake messages, and more
Tech News

Microsoft Teams really could be bad for your (security) health – hackers spoof bosses, send fake messages, and more

Microsoft Teams flaws allowed message edits, spoofed alerts, and forged caller identities Attackers could exploit these bugs for phishing, wire fraud, and malware delivery Microsoft patched CVE-2024-38197; no user action needed post-October 2025 fixes Experts have found Microsoft Teams contained multiple vulnerabilities whioch allowed threat actors to edit messages, spoof notifications, and change user names, […]

Worrying WatchGuard VPN bug could let hackers hijack your devices – here’s how to stay safe
Tech News

Worrying WatchGuard VPN bug could let hackers hijack your devices – here’s how to stay safe

CVE-2025-9242 allows unauthenticated remote code execution on WatchGuard Fireware devices Vulnerability affects VPN configurations using IKEv2 with dynamic gateway peers Businesses should patch affected versions and restrict internet access to essential devices only WatchGuard Fireware, the operating system powering much of WatchGuard’s software, carried a critical severity vulnerability that allowed threat actors to execute arbitrary […]

North Korean hackers found hiding crypto-stealing malware with Blockchain
Tech News

North Korean hackers found hiding crypto-stealing malware with Blockchain

UNC5342 uses blockchain smart contracts to deliver crypto-stealing malware via EtherHiding Fake jobs and coding challenges lure developers into triggering the JadeSnow loader and backdoor Blockchain’s immutability makes malware hosting resilient North Korean state-sponsored threat actors are now using public blockchains to host malicious code and deploy malware on target endpoints. This is according to […]

Red Hat confirms major data breach after hackers claim mega haul
Tech News

Red Hat confirms major data breach after hackers claim mega haul

Crimson Collective breached Red Hat’s GitHub, stealing 570GB from 28,000 internal projects Hackers claim to have stolen 800 Customer Engagement Records with sensitive infrastructure data Red Hat confirmed breach but denied evidence of stolen CERs or impact on other services Red Hat confirmed suffering a data breach, but did not verify hacker claims of stolen […]

Broadcom finally patches dangerous VMware zero-day exploited by Chinese hackers
Tech News

Broadcom finally patches dangerous VMware zero-day exploited by Chinese hackers

Broadcom patches CVE-2025-41244, a high-severity VMware privilege escalation zero-day Chinese actor UNC5174 exploited the bug using malicious binaries in paths like /tmp/httpd UNC5174 previously targeted French government and commercial sectors using Ivanti CSA vulnerabilities Broadcom has patched a high-severity vulnerability affecting its VMware Aria Operations and VMware Tools that was apparently used as a zero-day […]

AI-driven identity fraud escalates as hackers bypass iPhone cameras with deepfake injections, leaving biometric systems dangerously exposed
Tech News

AI-driven identity fraud escalates as hackers bypass iPhone cameras with deepfake injections, leaving biometric systems dangerously exposed

Deepfake injection attacks bypass cameras and deceive video verification software directly Face swaps and motion re-enactments transform stolen images into convincing deepfakes Managed detection services can identify suspicious patterns before attacks succeed Digital communication platforms are increasingly vulnerable to sophisticated attacks that exploit advanced artificial intelligence. A report from iProov reveals a specialized tool capable […]

TechToday Logo

Your go-to destination for the latest in tech, AI breakthroughs, industry trends, and expert insights.

Get Latest Updates and big deals

Our expertise, as well as our passion for web design, sets us apart from other agencies.

Digitally Interactive  Copyright 2022-25 All Rights Reserved.