North Korean Hackers Target Zoom Calls to Spread Malware, Expert Warns
A new type of bizarre cyberattack has emerged, with North Korean hackers using video conferencing platforms like Zoom to exploit unsuspecting users and spread...
Ransomware Gang Claims Breach of Telecom Giant Orange
A new cybersecurity threat is emerging from the Babuk ransomware group, which has made alarming claims about a massive data breach at Orange, a...
Ransomware Threatens Organizations Across Multiple Sectors
The FBI and the U.S. Cybersecurity and Infrastructure Security Agency (CISA) have issued a warning about an emerging ransomware threat, Medusa, which has been...
DeepSeek’s AI Model Can Be Manipulated to Generate Malicious Code, Researchers...
DeepSeek's reasoning model, R1, a new AI tool designed to assist in various tasks, has shown vulnerabilities when it comes to generating malicious software....
Chinese Cyberespionage Group Targets Defense and Technology Organizations’ Routers
A Chinese-based cyberespionage group, identified as UNC3886, has been targeting Juniper Networks' widely used Junos OS routers, leveraging custom backdoors designed for outdated hardware....
It’s Starting: This Country Moves to Curb AI Misuse with Strict...
Spain has introduced a new bill aimed at regulating the use of artificial intelligence (AI) generated content, particularly focusing on the growing concern of...
Cybersecurity Alert: This Trojan Steals Login Data via Fake Google Play...
A new trojan named PlayPraetor is making waves in the cybersecurity world, targeting Android users through deceptive Google Play-like pages. This malware is spread...
AI Chatbots Unwittingly Spread Russian Disinformation, Study Finds
A recent study by NewsGuard has revealed that several prominent Western AI chatbots, including ChatGPT-4-o, Gemini, Claude, and others, have been spreading Russian disinformation,...
Pro-Palestinian Hacktivists Take Down X
On Monday, X (formerly known as Twitter) was hit by widespread outages, with users around the world experiencing difficulties accessing the platform. The hacktivist...
DOD Denies Claims of Halt of CyberOps Against Russia
Recent reports have raised concerns within the cybersecurity community about the U.S. potentially halting its offensive cyber operations against Russia. Now, the Pentagon has...
New Machine Learning Model Detects Harmful Social Media Comments
A new machine-learning model developed by a team of researchers from Australia and Bangladesh is making waves in the fight against toxic social media...
Your Lost Luggage May Have Put You at Risk of Identity...
A recent cybersecurity discovery has revealed a major data leak that could have serious consequences for travelers worldwide. Fourteen publicly exposed databases containing over...
Google Expands Scam Detection Technology for Calls and Messages
Google is ramping up its efforts to protect users from fraudulent activity by rolling out expanded scam detection features for both calls and messages.
Previously,...
Ransomware Group Targets Cancer Clinic, Exposes Sensitive Health Data
In a concerning development, the Qilin ransomware group has claimed responsibility for the February 10th cyberattack on the Utsunomiya Central Clinic (UCC), a prominent...
U.S. Pauses Cyber Operations Against Russia
In a move that has left many scratching their heads, the United States has ordered a temporary halt on offensive cyber and information operations...
OpenAI Bans Malicious Accounts from China and North Korea
OpenAI has recently banned several accounts from users in China and North Korea, citing concerns that its technology was being used for harmful purposes,...
The New Battlefield: Cyber Warfare and Its Impact on National Security
As cyberattacks continue to grow in frequency and sophistication, experts are highlighting the increasing vulnerability of governments and military sectors. Despite the escalating financial...
Apple Vulnerability Turns Bluetooth Devices into AirTag-Like Trackers
Researchers from George Mason University have uncovered a serious security flaw in Apple’s Find My network, potentially allowing attackers to turn any Bluetooth-enabled device...
Unsecured Database Leak Exposes Sensitive Medical Data of Over 1.6 Million...
A massive data breach has come to light, revealing the unsecured exposure of 2 terabytes of sensitive information. The leak affected more than 1.6...
New Research Exposes Security Gaps in AI-Powered Software Development
The rise of AI-driven coding tools is revolutionizing software development, but new research highlights serious security risks linked to AI-generated code. As AI assistants...
Largest-Ever Crypto Heist steals $1.4 Billion
Cryptocurrency exchange Bybit became the latest victim of a major cyberattack, marking what appears to be the largest crypto hack in history. The breach,...
Ransomware Cartel Threatens FBI with Stolen Data
In a chilling message posted on February 25, 2025, the alleged leader of the notorious LockBit ransomware group, LockBitSupp, issued a disturbing "birthday gift"...