Microsoft Offers $5 Million at Zero Day Quest Hacking Contest

Research demonstrating high-impact cloud and AI security flaws will be rewarded at Microsoft’s Zero Day Quest competition in spring 2026.

The post Microsoft Offers $5 Million at Zero Day Quest Hacking Contest appeared first on SecurityWeek.

SecurityWeek – ​Read More

SonicWall Hunts for Zero-Day Amid Surge in Firewall Exploitation

Threat actors might be exploiting a zero-day vulnerability in SonicWall firewalls in a fresh wave of ransomware attacks.

The post SonicWall Hunts for Zero-Day Amid Surge in Firewall Exploitation appeared first on SecurityWeek.

SecurityWeek – ​Read More

15,000 Fake TikTok Shop Domains Deliver Malware, Steal Crypto via AI-Driven Scam Campaign

Cybersecurity researchers have lifted the veil on a widespread malicious campaign that’s targeting TikTok Shop users globally with an aim to steal credentials and distribute trojanized apps.
“Threat actors are exploiting the official in-app e-commerce platform through a dual attack strategy that combines phishing and malware to target users,” CTM360 said. “The core tactic involves a deceptive

The Hacker News – ​Read More

SonicWall Investigating Potential SSL VPN Zero-Day After 20+ Targeted Attacks Reported

SonicWall said it’s actively investigating reports to determine if there is a new zero-day vulnerability following reports of a spike in Akira ransomware actors in late July 2025.
“Over the past 72 hours, there has been a notable increase in both internally and externally reported cyber incidents involving Gen 7 SonicWall firewalls where SSLVPN is enabled,” the network security vendor said in a

The Hacker News – ​Read More

Crypto ATMs fueling criminal activity, Treasury warns

The Treasury Department warned that the massive increase in the number of crypto ATMs — convertible virtual currency kiosks — has been accompanied by a spike in the number of operators who fail to comply with anti-money laundering rules.

The Record from Recorded Future News – ​Read More

Nvidia Patches Critical RCE Vulnerability Chain

The flaws in the company’s Triton Inference Server enables model theft, data leaks, and response manipulation.

darkreading – ​Read More

Could Apple create an AI search engine to rival Gemini and ChatGPT? Here’s how it could succeed

Apple has been trying to catch up in the AI race. Can this AI search engine be the catalyst?

Latest news – ​Read More

You can use T-Mobile’s Starlink service to send images, audio, and video now – here’s how

T-Satellite now offers MMS on select Android phones. And, soon, it’ll support app data from optimized third-party apps.

Latest news – ​Read More

Threat Actors Increasingly Leaning on GenAI Tools

From “eCrime” actors to fake IT tech workers, CrowdStrike researchers found that adversaries are using AI to enhance their offensive cyber operations.

darkreading – ​Read More