Incognito settlement, hallucinated software, phone protocols vulnerable | Cybersecurity Headlines | Podwise