Key TakeawaysMassive Data Theft: Odido announced hackers stole personal data from 6.2 million customers, including personally identifiable data such as names, addresses, bank account numbers,…
Key TakeawaysAttack Vector: Cybercriminals use social engineering to trick IT help desks, resetting employee passwords and MFA to gain account access.Primary Objective: Attackers infiltrate payroll…
Key TakeawaysGuilty Plea: Peter Williams, the former boss of U.S. hacking tool firm Trenchant, pleaded guilty to stealing and selling eight exploits from his employer.Russian…
Key TakeawaysZero-Click Vulnerability: A "zero-click" exploit tricks AI agents operating within messaging apps into exfiltrating sensitive data without user interaction.Attack Vector: The vulnerability leverages automatic…
Key TakeawaysNordVPN Birthday Deals: Up to 76% off two-year plans with three bonus months includedAmazon Voucher Offers: US, UK, CA, AU users get discounts plus…
Key TakeawaysGuilty Plea: A 34-year-old U.S. Air Force Airman pleaded guilty to one count of receiving child pornography and faces a maximum of 20 years…
Key TakeawaysThird-Party Breach: A data breach at HR outsourcing firm Conduent exposed the personal information of nearly 17,000 employees of Volvo Group North America.Prolonged Access:…
Key TakeawaysCurrent Tactic: North Korean operatives are using verified LinkedIn profiles to impersonate professionals and establish trust with targets.Possible Goal: The primary objective for such…
Key TakeawaysAI-Driven Development: Darktrace researchers identified a fully AI-generated malware strain exploiting the React2Shell vulnerability, demonstrating how LLMs lower the barrier for effective cyberattacks.Targeted Infrastructure:…
Key TakeawaysSystem Disruption: A cybersecurity incident forced the temporary suspension of operations at Senegal's Directorate of File Automation (DAF), the agency managing national ID cards…
Key TakeawaysCritical Flaws Exposed: Two zero-day vulnerabilities (CVE-2026-1281 and CVE-2026-1340) in Ivanti Endpoint Manager Mobile (EPMM) allow attackers to hijack devices without authentication.Government Systems Hacked:…
Key TakeawaysMassive Data Exposure: A hacktivist scraped and published the payment records of over half a million customers of consumer-grade stalkerware apps.Vulnerability Exploited: The data…
Key TakeawaysDatabase Sale: Threat actor "quellostanco" claims to be selling a database of approximately 104,000 records allegedly stolen from EgyptAir on a cybercrime forum.Compromised Data:…
Key TakeawaysTargeted Attack: Cyber espionage group UNC3886 targeted Singapore's four major telecom companies: Singtel, StarHub, M1, and Simba Telecom.Limited Exfiltration: The attackers successfully infiltrated some…
Crypto crime has moved offline as criminals are targeting people and households, not only wallets or exchanges. As digital risks seep into real lives, AI-assisted…
Key TakeawaysThird-Party Vulnerability: A security flaw in one of Flickr's third-party email service providers could have led to a data breach, exposing user information.Exposed Information:…
Key TakeawaysArrest and Charges: Aaron Corey, 23, of Albany, New York, was arrested and charged with receiving CSAM, facing up to 20 years in prison.Group…
Key TakeawaysVishing Tactic: A campaign uses deceptive emails about blocked transactions to induce victims to call a fraudulent support number, shifting the attack vector from…
For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: