-
Substack confirms a breach after hacker accessed internal user records now circulating on crime forums, exposing emails, phone numbers, and account metadata.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Microsoft details 3 Python Infostealers hitting macOS users via fake AI tools, Google ads, and Terminal tricks to steal passwords and crypto, then erase traces.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Compromised home routers in 30+ countries had DNS traffic redirected, sending users to malicious sites while normal browsing appeared unaffected.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Researchers recently tracked a high-speed cloud attack where an intruder gained full admin access in just eight minutes. Discover how AI automation and a simple storage error led to a major security breach.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
A dangerous shift in phishing tactics, with threat actors increasingly hosting malicious infrastructure on trusted cloud platforms like Microsoft Azure, Google Firebase, and AWS CloudFront. Unlike traditional phishing campaigns that rely on newly regis…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
A new campaign by the Russian-linked group APT28, called Op Neusploit, exploits a Microsoft Office flaw to steal emails for remote control of devices in Ukraine, Slovakia, and Romania.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Everest ransomware claims a breach involving legacy Polycom systems later acquired by HP Inc., alleging the theft of 90GB of internal data.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
A multi-stage phishing campaign is targeting business users by exploiting Vercel cloud storage, PDF attachments, and Telegram bots to steal Dropbox credentials.
·
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
A months-long breach allowed Chinese State-sponsored hackers to hijack Notepad++ updates in 2025, exposing users to malware via a compromised hosting provider.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶


