A new ‘ultra-secure’ phone carrier says it can make you harder to track
Cape’s privacy-focused service comes with a pre-configured Android phone and aims to minimize data collection. A new cell phone carrier is...
Read moreDetailsCape’s privacy-focused service comes with a pre-configured Android phone and aims to minimize data collection. A new cell phone carrier is...
Read moreDetailsMicrosoft is being investigated by the Federal Trade Commission in a wide-ranging antitrust probe, making it the fifth Big Tech...
Read moreDetailsWhen assessing an organization's external attack surface, encryption-related issues (especially SSL misconfigurations) receive special attention. Why? Their widespread use, configuration complexity,...
Read moreDetailsThe Federal Trade Commission (FTC) has finalized amendments to its Telemarketing Sales Rule (TSR), making it easier to protect consumers who are...
Read moreDetailsStorm-1977 Hits Education Clouds with AzureChecker, Deploys 200+ Crypto Mining Containers
Read moreDetailsEvery device, every account, every endpoint is now a potential gateway for intrusion. Are We Ready for the Next Cyber...
Read moreDetailsToyMaker Uses LAGTOY to Sell Access to CACTUS Ransomware Gangs for Double Extortion
Read moreDetailsPete Hegseth’s Signal Scandal Spirals Out of Control
Read moreDetailsWhenever you open an app on your phone or a webpage on your computer, you are seeing the results of...
Read moreDetailsNorth Korean Hackers Spread Malware via Fake Crypto Firms and Job Interview Lures
Read moreDetailsThe Download: how Trump’s tariffs will affect US manufacturing, and AI architecture
Read moreDetailsNew Critical SAP NetWeaver Flaw Exploited to Drop Web Shell, Brute Ratel Framework
Read moreDetailsWhy NHIs Are Security's Most Dangerous Blind Spot
Read moreDetailsSweeping tariffs could threaten the US manufacturing rebound
Read moreDetailsResearchers Identify Rack::Static Vulnerability Enabling Data Breaches in Ruby Servers
Read moreDetailsDslogdRAT Malware Deployed via Ivanti ICS Zero-Day CVE-2025-0282 in Japan Attacks
Read moreDetailsProtecting Your Phone—and Your Privacy—at the US Border
Read moreDetailsGmail’s New Encrypted Messages Feature Opens a Door for Scams
Read moreDetails© 2025 Sumtrix – Your source for the latest in Cybersecurity, AI, and Tech News.