-
A new phishing campaign is using stolen certificates from TrustConnect Software PTY LTD to sign malware. By impersonating updates for Zoom and Microsoft Teams, hackers install RMM tools to gain persistent, privileged access to networks
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
The University of Hawaii Cancer Centre has confirmed a massive ransomware attack affecting 1.24 million people. Sensitive data, including Social Security numbers and historical voter records dating back to 1993, was compromised.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Phishing drives about 90% of cyberattacks in 2026, using tactics like encrypted flows, QR code scams, and trusted cloud platforms to steal credentials.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
New research from IMDEA Networks reveals how unencrypted signals from tyre pressure sensors in brands like Toyota and Mercedes can be used for covert vehicle tracking. Learn how these low-cost systems can map out your daily routines and why current reg…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Hackers took over Iran’s BadeSaba Calendar prayer app, sending “Help Is on the Way” alerts and messages urging soldiers to lay down weapons.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Major Pakistani TV channels, including Geo News and ARY News, were hit by a coordinated cyberattack on 1 March 2026. Hackers took control of live satellite feeds to display unauthorised messages. Read more about the breach, the regional impact, and the…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
ShinyHunters hackers leak 2 million records from Dutch telecom Odido after ransom refusal, claiming up to 21 million customer records were stolen in the breach.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Fraudsters clone Avast’s website to target French users with a €499 phishing scam, using urgency tactics, live chat, and card validation to steal payment data.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
New VulnCheck research reveals that while thousands of CVEs are discovered yearly, only 1% drive real-world impact.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
OpenAI has confirmed that Chinese-linked operators misused ChatGPT as part of a broader campaign that blended cyber operations, online harassment, and covert influence tactics, according to its latest threat report “Disrupting malicious uses of AI.” …
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶


