Public mobile networks are being weaponized for combat drone operations

On June 1, 2025, Ukraine launched a coordinated drone strike on five airfields inside Russia, disabling or destroying aircrafts. The attack involved more than 100 drones carrying explosive payloads and targeting aircraft on the ground. The drones used … Continue reading Public mobile networks are being weaponized for combat drone operations

Consumers feel less judged by AI debt collectors

Debt collection agencies are starting to use automated voice systems and AI-driven messaging to handle consumer calls. These systems help scale outreach, reduce call center staffing demands, and offer 24/7 service. A new study covering 11 European coun… Continue reading Consumers feel less judged by AI debt collectors

Microsoft Defender update lets SOC teams manage, vet response tools

Microsoft introduced library management in Microsoft Defender to help security analysts working with live response manage scripts and tools they use to triage, investigate and remediate threats. The library management interface allows analysts to organ… Continue reading Microsoft Defender update lets SOC teams manage, vet response tools

AWS coding agents gain new plugin support across development tools

AI coding assistants have become a routine part of many development workflows, helping engineers write, test, and deploy code from IDEs or command line interfaces. One recent change in this ecosystem makes it possible for those agents to interact with … Continue reading AWS coding agents gain new plugin support across development tools

AWS coding agents gain new plugin support across development tools

AI coding assistants have become a routine part of many development workflows, helping engineers write, test, and deploy code from IDEs or command line interfaces. One recent change in this ecosystem makes it possible for those agents to interact with … Continue reading AWS coding agents gain new plugin support across development tools

OT teams are losing the time advantage against industrial threat actors

In many industrial environments, internet-facing gateways, remote access appliances, and boundary systems sit close enough to production networks that attackers can move from IT intrusion to operational disruption with limited resistance. Dragos’ 2026 … Continue reading OT teams are losing the time advantage against industrial threat actors

ChatGPT gets new security feature to fight prompt injection attacks

OpenAI has introduced Lockdown Mode and Elevated Risk labels in ChatGPT to help users and organizations reduce the risk of prompt injection attacks and other advanced security threats, particularly when using features that interact with external system… Continue reading ChatGPT gets new security feature to fight prompt injection attacks

Vim 9.2 adds scripting updates, diff improvements, and experimental Wayland support

Vim 9.2 adds a range of incremental changes focused on scripting, usability, and cross-platform support. The update includes improvements to completion behavior, expanded Vim9 language features, and new options for diff mode. Completion updates in inse… Continue reading Vim 9.2 adds scripting updates, diff improvements, and experimental Wayland support

Apple privacy labels often don’t match what Chinese smart home apps do

Smart home devices in many homes collect audio, video, and location data. The apps that control those devices often focus on the account owner, even when the technology also captures guests, neighbors, and other people who never agreed to be monitored…. Continue reading Apple privacy labels often don’t match what Chinese smart home apps do