Cybersecurity

Indian Court Orders Action to Block Proton Mail Over AI Deepfake Abuse Allegations 

Indian Court Orders Action to Block Proton Mail Over AI Deepfake Abuse Allegations 

A high court in the Indian state of Karnataka has ordered the blocking of end-to-end encrypted email provider Proton Mail across the country.
The High Court of Karnataka, on April 29, said the ruling was in response to a legal complaint filed by M Moser Design Associated India Pvt Ltd in January 2025.

The complaint alleged its staff had received e-mails containing obscene, abusive

WhatsApp Launches Private Processing to Enable AI Features While Protecting Message Privacy 

WhatsApp Launches Private Processing to Enable AI Features While Protecting Message Privacy 

Popular messaging app WhatsApp on Tuesday unveiled a new technology called Private Processing to enable artificial intelligence (AI) capabilities in a privacy-preserving manner.
“Private Processing will allow users to leverage powerful optional AI features – like summarizing unread messages or editing help – while preserving WhatsApp’s core privacy promise,” the Meta-owned service said in a

New Reports Uncover Jailbreaks, Unsafe Code, and Data Theft Risks in Leading AI Systems 

New Reports Uncover Jailbreaks, Unsafe Code, and Data Theft Risks in Leading AI Systems 

Various generative artificial intelligence (GenAI) services have been found vulnerable to two types of jailbreak attacks that make it possible to produce illicit or dangerous content.
The first of the two techniques, codenamed Inception, instructs an AI tool to imagine a fictitious scenario, which can then be adapted into a second scenario within the first one where there exists no safety

The AI Fix #48: AI Jesus, and is the AI Singularity almost upon us? 

The AI Fix #48: AI Jesus, and is the AI Singularity almost upon us? 

In episode 48 of The AI Fix, OpenAI releases the first AI models capable of novel scientific discoveries, ChatGPT users are sick of its relentlessly positive tone, our hosts say “Alexa” a lot, OpenAI eyes a social network of its own, and some robots run a half-marathon.

Graham discovers AI Jesus and a great offer on some Casper mattresses, and Mark wonders if the technological singularity is actually much closer than we thought.

All this and much more is discussed in the latest edition of “The AI Fix” podcast by Graham Cluley and Mark Stockley.

SentinelOne Uncovers Chinese Espionage Campaign Targeting Its Infrastructure and Clients 

SentinelOne Uncovers Chinese Espionage Campaign Targeting Its Infrastructure and Clients 

Cybersecurity company SentinelOne has revealed that a China-nexus threat cluster dubbed PurpleHaze conducted reconnaissance attempts against its infrastructure and some of its high-value customers.
“We first became aware of this threat cluster during a 2024 intrusion conducted against an organization previously providing hardware logistics services for SentinelOne employees,” security

Product Walkthrough: Securing Microsoft Copilot with Reco 

Product Walkthrough: Securing Microsoft Copilot with Reco 

Find out how Reco keeps Microsoft 365 Copilot safe by spotting risky prompts, protecting data, managing user access, and identifying threats – all while keeping productivity high.

Microsoft 365 Copilot promises to boost productivity by turning natural language prompts into actions. Employees can generate reports, comb through data, or get instant answers just by asking Copilot. 
However,

21 million employee screenshots leaked in bossware breach blunder 

21 million employee screenshots leaked in bossware breach blunder 

If you thought only your boss was peeking at your work screen, think again.

Employee-monitoring tool Work Composer has committed a jaw-dropping blunder, leaving a treasure trove of millions of workplace screenshots openly accessible on the internet with no encryption in place, and no password required.

Read more in my article on the Hot for Security blog.

Google Reports 75 Zero-Days Exploited in 2024 — 44% Targeted Enterprise Security Products 

Google Reports 75 Zero-Days Exploited in 2024 — 44% Targeted Enterprise Security Products 

Google has revealed that it observed 75 zero-day vulnerabilities exploited in the wild in 2024, down from 98 in 2023. 
Of the 75 zero-days, 44% of them targeted enterprise products. As many as 20 flaws were identified in security software and appliances.
“Zero-day exploitation of browsers and mobile devices fell drastically, decreasing by about a third for browsers and by about half for

Malware Attack Targets World Uyghur Congress Leaders via Trojanized UyghurEdit++ Tool 

Malware Attack Targets World Uyghur Congress Leaders via Trojanized UyghurEdit++ Tool 

In a new campaign detected in March 2025, senior members of the World Uyghur Congress (WUC) living in exile have been targeted by a Windows-based malware that’s capable of conducting surveillance.
The spear-phishing campaign involved the use of a trojanized version of a legitimate open-source word processing and spell check tool called UyghurEdit++ developed to support the use of the Uyghur

NEW CUSTOMERS CALL TODAY: 720.221.6804  |  EXISTING CUSTOMERS REQUIRING SUPPORT: 303.617.6442

X