Vulnerable U logo
Vulnerable U
Sponsors
Subscribe
  • Vulnerable U
  • Topics
  • News

News

Cybersecurity and tech news articles

Mental HealthApacheMicrosoftcybercrimeMalwareChinaIranVulnerabilityLinuxAINewsIoTGovernmentHardwareAndroidRansomwareVulnU - PremiumsponsoredAppleRussiaNewsletterGoogledata breachGuides
AIAI
+1+1
AI-Powered Kids’ Toy Turns a Bedroom Into an Attack Surface
21 hours ago

AI-Powered Kids’ Toy Turns a Bedroom Into an Attack Surface

Newsroom
Newsroom
MalwareMalware
+2+2
Notepad++ Updates Became a Malware Delivery Pipeline
23 hours ago

Notepad++ Updates Became a Malware Delivery Pipeline

Newsroom
Newsroom
AIAI
+1+1
Moltbot, Prompt Injection, and the New Attack Surface of Always‐On AI Agents
Jan 30, 2026

Moltbot, Prompt Injection, and the New Attack Surface of Always‐On AI Agents

Newsroom
Newsroom
AIAI
+2+2
When the Cyber Chief Becomes the Cautionary Tale: What a Public ChatGPT Upload Teaches Security Teams
Jan 30, 2026

When the Cyber Chief Becomes the Cautionary Tale: What a Public ChatGPT Upload Teaches Security Teams

Newsroom
Newsroom
AIAI
+1+1
Welcome to the Sloppocalypse
Jan 30, 2026

Welcome to the Sloppocalypse

Matt Johansen
Matt Johansen
ChinaChina
+2+2
F5 breach - everything we know so far
Oct 16, 2025

F5 breach - everything we know so far

F5 says a nation-state actor accessed internal dev systems, exfiltrated BIG-IP source code and vulnerability details, and triggered a CISA emergency patch directive.

Matt Johansen
Matt Johansen
cybercrimecybercrime
+1+1
Cartel Hacker Turned an FBI Agent’s Phone into a Hit List
Jul 02, 2025

Cartel Hacker Turned an FBI Agent’s Phone into a Hit List

How a single phone number, leaky telecom data, and a city-wide camera grid helped the Sinaloa cartel hunt, and reportedly kill, U.S. informants.

Newsroom
Newsroom
NewsNews
Data Brokers and the 2025 Minnesota Lawmaker Shooting
Jun 19, 2025

Data Brokers and the 2025 Minnesota Lawmaker Shooting

An inside look at Vance Boelter’s use of 11 people-search services to track and attack officials, and why weak U.S. privacy laws still leave every home address exposed.

Matt Johansen
Matt Johansen
NewsNews
+1+1
UNFI Cyberattack Halts Deliveries to Whole Foods and 30,000+ Grocery Stores
Jun 13, 2025

UNFI Cyberattack Halts Deliveries to Whole Foods and 30,000+ Grocery Stores

June 2025 breach forces UNFI to take critical systems offline, triggering order backlogs, an FBI investigation, and scrutiny of critical infrastructure.

Newsroom
Newsroom
AIAI
+2+2
Apple WWDC 2025: Every iOS 26 Security & Privacy Feature Explained
Jun 10, 2025

Apple WWDC 2025: Every iOS 26 Security & Privacy Feature Explained

Deep dive into call screening, messages filtering, on-device AI, PCC, and promised RCS encryption - what they mean for security and privacy

Matt Johansen
Matt Johansen
NewsNews
+1+1
Lockbit, laid bare: what a SQL dump tells us about the world’s most notorious ransomware-as-a-service
May 30, 2025

Lockbit, laid bare: what a SQL dump tells us about the world’s most notorious ransomware-as-a-service

Analysis of leaked builds, chat logs and wallet tables uncovers how new affiliates fuel global ransomware attacks.

Newsroom
Newsroom
MalwareMalware
+1+1
Booking.com? more like Booking.exe: inside a ClickFix email that drops malware
May 30, 2025

Booking.com? more like Booking.exe: inside a ClickFix email that drops malware

How attackers use clipboard PowerShell stagers and brand-spoofed links to bypass macros and drop a .NET RAT.

Newsroom
Newsroom
Infosec's favorite weekly newsletter for news, tools, and tips with 32,000+ CISOs, founders, change-makers, and straight up hackers.

Vulnerable U

Infosec's favorite weekly newsletter for news, tools, and tips with 32,000+ CISOs, founders, change-makers, and straight up hackers.

Home

Posts

Authors

Account

Upgrade

© 2026 Vulnerable U.

Privacy policy

Terms of use