Recent
Hacker - Phishing - Skull - Data

Key TakeawaysInternational Takedown: Europol and German authorities dismantled the RedVDS cybercrime-as-a-service platform with Microsoft’s help.Massive Phishing Operations: In a single month, over 2,600 RedVDS virtual…

|
Published
Target

Key TakeawaysLeak Confirmed: Current and former Target employees have confirmed that samples of leaked source code and documentation match real internal systems and projects.Git Server…

|
Published
Bank Building - Data Stream - Man

Key TakeawaysComplex Threat: Devixor is a sophisticated Android RAT that integrates financial data theft, credential harvesting, remote device control, and a ransomware module.Targeted Campaign: It…

|
Published
Malware Target

Key TakeawaysCloud-Native Design: VoidLink is a sophisticated malware framework capable of detecting and adapting to environments like AWS, Azure, and Google Cloud.Modular Architecture: Its extensive…

|
Published
JPMorgan

Key TakeawaysThird-Party Breach: JPMorgan Chase reported a data breach originating from a cybersecurity incident at the law firm Fried, Frank, Harris, Shriver & Jacobson LLP.Affected…

|
Published
US Court with Flag

Key TakeawaysGuilty Plea Expected: Nicholas Moore, 24, is scheduled to plead guilty to accessing the Supreme Court's electronic filing system without authorization.Repeated Unauthorized Access: Court…

|
Published
Server Room – IoT Router

Key TakeawaysCritical Flaw: A high-severity flaw in Broadcom chipsets allows attackers to terminate client connections on 5 GHz networks via a single over-the-air frame.Hardware Impact:…

|
Published
E-Commerce - Websites - Laptop - Shopping Cart

Key TakeawaysExtensive Campaign: A long-term, ongoing web-skimming campaign has been uncovered, targeting global e-commerce platforms.Targeted Providers: The operation explicitly targets major payment networks, including American…

|
Published
Hacker - Spy - Laptop - Data

Key TakeawaysDark Web Sale: A threat actor is offering a dataset allegedly containing 8 million Armenian government records for $2,500 on an underground forum.Government Response:…

|
Published
Office Staff Insider Threat

Key TakeawaysPrison Sentence: A Dutch national has been sentenced to seven years in prison for hacking ports in Rotterdam and Antwerp to facilitate drug trafficking.Attack…

|
Published
Windscribe Privacy Partnership Forms Decentralized Alliance

Key TakeawaysWindscribe privacy partnership overview: Windscribe teams with Kagi, Notesnook, Addy.io, and Ente to promote decentralized privacy tools for users.Reason behind the alliance: Independent infrastructures…

|
Published

Dean P. – Fox Corporation  Dean P. has taken up the role of chief information officer and chief information security officer at Fox Corporation, overseeing…

|
Published on January 12, 2026
Healthcare industry, a target for cyberattackers

Key TakeawaysRansomware Attack: The University of Hawaiʻi Cancer Center suffered a ransomware attack in August, resulting in the encryption of research files and a ransom…

|
Published on January 12, 2026

Key TakeawaysRegulatory Enforcement: The California Privacy Protection Agency has fined marketing firm Datamasters $45,000 for selling sensitive data.Reselling Ban: The unregistered broker was banned from…

|
Published on January 12, 2026
One unlocked padlock among locked padlocks

Key TakeawaysThreat Actor Claim: The Everest hacking group has claimed responsibility for a cyberattack against Nissan Motor Co., Ltd.Data Exfiltration Allegations: The group alleges it…

|
Published on January 12, 2026
instagram_icons

Key TakeawaysPlatform Denial: Instagram said no data breach occurred, attributing a recent influx of emails to a now-fixed bug that allowed an external party to…

|
Published on January 12, 2026
School - Government - Network

Cyber incidents are not isolated technical failures; they impact public services, law enforcement priorities, and international justice, besides personal safety. This week's news coverage shows…

|
Published on January 10, 2026
Kentucky Mobile ID Rollout and Digital Identity Shift

Key TakeawaysKentucky Mobile ID launch: Digital ID app allows voluntary, secure TSA airport verification; limited use, stored locally, encrypted Bluetooth sharing.Current scope and limits: App…

|
Published on January 10, 2026

Key TakeawaysMass Compromise: Kimwolf infected over 2 million devices, targeting unofficial Android TV streaming boxes to facilitate DDoS attacks and residential proxy services.Shared Infrastructure: Kimwolf…

|
Published on January 9, 2026
Snapchat Logo On Iphone Screen

Key TakeawaysFederal Charges: Kyle Svara faces multiple charges for allegedly phishing Snapchat access codes from nearly 600 women.Targeted Demographics: Svara targeted women in Illinois, Colby…

|
Published on January 9, 2026
For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: