Elles De Yeager
-
Ex-Officer Gets Suspended Sentence for Selling Police Files to Journalist Nephew
A former police officer in Yekaterinburg has received a four-year suspended sentence after admitting to selling confidential police files. The court press service confirmed the ruling on Tuesday. Andrei Karpov,…
·
·
1–2 minutes -
The European Union Votes to Deepen Defense Industry Ties with Ukraine
European Union lawmakers have voted to deepen the integration of the bloc’s defense industry with Ukraine, approving a 1.5-billion euro program. This strategic move aims to foster a more resilient…
·
·
2–3 minutes -
Air Force practices operating from cut-off bases in fierce future war
The U.S. Air Force is actively preparing for potential conflicts, focusing on the ability of its units to operate independently from remote locations, even if communications are disrupted or supplies…
·
·
1–2 minutes -
U.S. Navy conducts joint mission with Guyana near Essequibo
The USS Winston S. Churchill, a U.S. Navy destroyer, recently completed a joint mission with Guyana’s GDFS Shahous in the Caribbean Sea. This operation, which occurred on November 22, signals…
·
·
1–2 minutes -
Grafana Patches CVSS 10.0 SCIM Flaw Enabling Impersonation and Privilege Escalation
Grafana has issued urgent security updates for a critical vulnerability in its SCIM provisioning feature, carrying a maximum CVSS score of 10.0. This flaw (CVE-2025-41115) could allow attackers to escalate…
·
·
1–2 minutes -
Google: Data of two hundred Salesforce customers stolen via Gainsight apps
A major cyberattack has resulted in the theft of data from over 200 Salesforce customers, stemming from compromised Gainsight applications. The group claiming responsibility is known as “Scattered Lapsus$ Hunters,”…
·
·
1–2 minutes -
AI-Based Obfuscated Malware Evades AV Detection
Malicious Android applications use AI-powered obfuscation to bypass antivirus detection. These apps mimic delivery services, steal user data, and employ sophisticated evasion techniques. Security analysts identified advanced obfuscation, making reverse…
·
·
1–2 minutes -
ShadowRay 2.0: Ray AI Flaw Exploited for Cryptomining
ShadowRay 2.0 exploits a Ray AI flaw, creating a self-spreading GPU cryptomining botnet. Attackers use unpatched vulnerabilities, GitLab, and GitHub to spread malware and hijack computing power.
·
·
3–4 minutes








