Author: admin

Dutch healthcare software vendor ChipSoft has been impacted by a ransomware attack that forced the company to take offline its website and digital services for patients and healthcare providers. ChipSoft is a large provider of Electronic Health Record (EHR) systems in the Netherlands. Its flagship platform, HiX, is used by many Dutch hospitals. Earlier this week, users on Reddit reported that the digital solutions developer for the healthcare sector was affected by a cybersecurity incident. Local media confirmed that the company was hit by a cyberattack, based on an internal memo ChipSoft circulated to healthcare institutions, alerting them of “possible unauthorized access.” The IT services…

Read More

Google has announced the rollout of new session cookie protections in Chrome to prevent account compromise via stolen authentication cookies. The feature, called Device Bound Session Credentials (DBSC), was announced in April 2024 and has become available in Chrome 146 for Windows. macOS users will receive it as well, in a future browser release. DBSC fights session cookie theft by cryptographically binding authentication sessions to the user’s device, thus rendering stolen cookies useless. Typically stolen using information-stealing malware and often shared or sold on cybercrime platforms, these tokens may provide attackers with access to users’ accounts without a password. “Once…

Read More

If you’re reading this, you’re likely in need of a 20,000mAh power bank. Before you do a quick search on Amazon or Best Buy, you need to know these four excellent high-capacity power banks within that range so you get the most value for your money.A lot of people find it perfectly acceptable to buy any power bank, so long as it comes from a reputable name brand. Meanwhile, some people really only care about the price. But you can’t go off these factors alone in your hunt for the right 20,000mAh power bank.Price and trustworthiness of the manufacturer aside,…

Read More

Looking for a different day?A new NYT Strands puzzle appears at midnight each day for your time zone – which means that some people are always playing ‘today’s game’ while others are playing ‘yesterday’s’. If you’re looking for Saturday’s puzzle instead then click here: NYT Strands hints and answers for Saturday, April 11 (game #769).Strands is the NYT’s latest word game after the likes of Wordle, Spelling Bee and Connections – and it’s great fun. It can be difficult, though, so read on for my Strands hints.Want more word-based fun? Then check out my NYT Connections today and Quordle today…

Read More

Ravie LakshmananApr 09, 2026Vulnerability / Threat Intelligence Threat actors have been exploiting a previously unknown zero-day vulnerability in Adobe Reader using maliciously crafted PDF documents since at least December 2025. The finding, detailed by EXPMON’s Haifei Li, has been described as a highly-sophisticated PDF exploit. The artifact (“Invoice540.pdf”) first appeared on the VirusTotal platform on November 28, 2025. A second sample was uploaded to VirusTotal on March 23, 2026. Given the name of the PDF document, it’s likely that there is an element of social engineering involved, with the attackers luring unsuspecting users into opening the files on Adobe Reader. Once launched, it automatically triggers the execution…

Read More

I used Claude the same way most people probably do: open a tab, type a question, get an answer, and close the tab. It kind of worked. But I kept running into the same issue: responses that were technically correct but missed the point. But as it turns out, I wasn’t being limited by the AI; I was being limited by a lazy setup. After a few weeks of trial and error, and some deep-diving into Claude’s more advanced features, I realized I wasn’t unlocking its full potential. Here is how I fixed mine, and how you can do the…

Read More

In this Help Net Security interview, Aqsa Taylor, Chief Security Evangelist, Exaforce, explains vibe hunting, an AI-driven approach to threat detection that inverts traditional hypothesis-driven methods. Instead of analysts defining attack vectors upfront, the AI scans datasets for anomalous patterns and surfaces potential threats. Taylor draws a firm line on responsibility: analysts must be able to explain their reasoning. When they cannot, the AI is steering the hunt. She also addresses enrichment, junior analyst development, and the failure modes that emerge when teams follow AI output without questioning it. Hypothesis-driven hunting has been the gold standard for years. Does vibe…

Read More

Every year, Google’s Pixel keynote is dominated by flashy AI demos and magic camera tricks that promise to rewrite your photos. But as a normal consumer, I have found that the most transformative part of the Pixel experience isn’t an AI chatbot or a long-range zoom. It’s a boring security feature called Private Space. Hidden away in the Android settings, this digital vault does more than hide your banking apps; it acts as a secondary sandboxed OS that changes how you organize your digital life. Related My Google Pixel is infinitely better since I tweaked these settings Pixel settings you…

Read More

A financially motivated threat actor tracked as Storm-2755 is stealing Canadian employees’ salary payments after hijacking their accounts in payroll redirection (also known as payroll pirate) attacks. The attackers used malicious Microsoft 365 sign-in pages to steal victims’ authentication tokens and session cookies by redirecting them to domains (e.g., bluegraintours[.]com) hosting malicious web pages (pushed to the top of search engine results through malvertising or SEO poisoning) that masqueraded as Microsoft 365 sign-in forms. This allowed Storm-2755 to bypass multifactor authentication (MFA) in adversary‑in‑the‑middle (AiTM) attacks by replaying stolen session tokens rather than re-authenticating. “Rather than harvesting only usernames and…

Read More