Okta beats third-quarter earnings expectations

Cheng Xin | Getty Images Okta on Tuesday topped Wall Street third-quarter estimates and issued an upbeat outlook as customers adopt identity management solutions. Shares of the identity management provider fell more than 3% in after-hours trading on Tuesday. Here’s how the company did versus LSEG estimates: Earnings per share: 82 cents adjusted vs. 76 […]

Continue Reading

ChatGPT outage: OpenAI’s chatbot is down for some users

OpenAI’s EMEA startups head Laura Modiano spoke at the Sifted Summit on Wednesday, 8 October. Nurphoto | Nurphoto | Getty Images OpenAI’s artificial intelligence chatbot ChatGPT is down for some users. The company said it is “currently experiencing issues,” including “increased ChatGPT error rates,” according to an update on OpenAI’s status page. “We have applied […]

Continue Reading

Researchers Capture Lazarus APT’s Remote-Worker Scheme Live on Camera

Dec 02, 2025The Hacker NewsIdentity Theft / Threat Intelligence A joint investigation led by Mauro Eldritch, founder of BCA LTD, conducted together with threat-intel initiative NorthScan and ANY.RUN, a solution for interactive malware analysis and threat intelligence, has uncovered one of North Korea’s most persistent infiltration schemes: a network of remote IT workers tied to […]

Continue Reading

GlassWorm Returns with 24 Malicious Extensions Impersonating Popular Developer Tools

Dec 02, 2025Ravie LakshmananMalware / Blockchain The supply chain campaign known as GlassWorm has once again reared its head, infiltrating both Microsoft Visual Studio Marketplace and Open VSX with 24 extensions impersonating popular developer tools and frameworks like Flutter, React, Tailwind, Vim, and Vue. GlassWorm was first documented in October 2025, detailing its use of […]

Continue Reading

Malicious npm Package Uses Hidden Prompt and Script to Evade AI Security Tools

Dec 02, 2025Ravie LakshmananAI Security / Software Supply Chain Cybersecurity researchers have disclosed details of an npm package that attempts to influence artificial intelligence (AI)-driven security scanners. The package in question is eslint-plugin-unicorn-ts-2, which masquerades as a TypeScript extension of the popular ESLint plugin. It was uploaded to the registry by a user named “hamburgerisland” […]

Continue Reading

Iran-Linked Hackers Hits Israeli Sectors with New MuddyViper Backdoor in Targeted Attacks

Israeli entities spanning academia, engineering, local government, manufacturing, technology, transportation, and utilities sectors have emerged as the target of a new set of attacks undertaken by Iranian nation-state actors that have delivered a previously undocumented backdoor called MuddyViper. The activity has been attributed by ESET to a hacking group known as MuddyWater (aka Mango Sandstorm […]

Continue Reading

Samsung Galaxy Z TriFold vs Huawei Mate XT Ultimate Design: Features and Specifications Compared

Samsung unveiled the Galaxy Z TriFold with a 10.0-inch main display and a 6.5-inch cover screen. The launch of Samsung’s first multi-folding smartphone heats up the competition in the foldable smartphone market. The Chinese brand Huawei launched the industry’s first three-way folding phone last September. Here’s a quick comparison to help you find out the […]

Continue Reading

Samsung Galaxy S26 Could Feature Revamped Lock Screen Customisation, 3D Wallpaper Effects, One UI 8.5 Leak Shows

Leaks suggest Samsung is developing several new One UI 8.5 features that may be exclusive to the Galaxy S26 series. The tools were enabled by a leaker using an internal AI build. Key additions include Now Nudges for contextual lock screen information, Wallpaper Live Effects for 3D parallax wallpapers, a Creative Studio for custom wallpaper […]

Continue Reading

SecAlerts Cuts Through the Noise with a Smarter, Faster Way to Track Vulnerabilities

Vulnerability management is a core component of every cybersecurity strategy. However, businesses often use thousands of software without realising it (when was the last time you checked?), and keeping track of all the vulnerability alerts, notifications, and updates can be a burden on resources and often leads to missed vulnerabilities. Taking into account that nearly […]

Continue Reading

Government Says Sanchar Saathi App Optional, Can Be Removed; Apple Reportedly Plans to Oppose Mandatory Installation

The Department of Telecommunications (DoT) recently directed smartphone makers to preload the Sanchar Saathi app on new devices. Reports suggested that OEMs would also have to ensure that users could not uninstall or disable the state-owned cybersecurity app. However, the government has now issued clarification on the same, stating that keeping it is completely option…

Continue Reading