Security2 Min Read October 3, 2025 Renault and Dacia UK warn of data breach impacting customers Customers of Renault and Dacia in the United Kingdom have been notified that sensitive information they shared with the car maker was…
Security2 Min Read October 3, 2025 Japanese beer giant Asahi confirms ransomware attack Japanese beer-making giant Asahi has disclosed today that a ransomware attack caused the IT disruptions that forced it to shut down factories…
Security3 Min Read October 3, 2025 ShinyHunters launches Salesforce data leak site to extort 39 victims An extortion group has launched a new data leak site to publicly extort dozens of companies impacted by a wave of Salesforce breaches,…
Artificial Intelligence Security Software3 Min Read October 3, 2025 CommetJacking attack tricks Comet browser into stealing emails A new attack called 'CometJacking' exploits URL parameters to pass to Perplexity's Comet AI browser hidden instructions that allow…
Cl0p Cyber Attack Cyber Attacks Cyber Crime Cybersecurity FIN11 Google Mandiant Ransomware Security2 Min Read October 3, 2025 Cl0p-Linked Gang Attempts to Extort Oracle E-Business Customers Cybersecurity experts are on high alert as a group claiming ties to the infamous Cl0p ransomware gang is bombarding companies with emails that…
Security2 Min Read October 3, 2025 Oracle links Clop extortion attacks to July 2025 vulnerabilities Oracle has linked an ongoing extortion campaign claimed by the Clop ransomware gang to E-Business Suite (EBS) vulnerabilities that were…
Google Security2 Min Read October 3, 2025 Gmail business users can now send encrypted emails to anyone Google says that Gmail enterprise users can now send end-to-end encrypted emails to people who use any email service or platform. To send an…
Cyber Attack Cyber Attacks Cybersecurity Privacy Renault Security United Kingdom2 Min Read October 2, 2025 Renault UK Customer Records Stolen in Third-Party Breach Renault UK is informing customers that their personal data may have been compromised following a cyberattack on one of its third-party service…
Microsoft Security2 Min Read October 2, 2025 Microsoft Outlook stops displaying inline SVG images used in attacks Microsoft says Outlook for Web and the new Outlook for Windows will no longer display risky inline SVG images that are being used in attacks.…
Hardware Security2 Min Read October 2, 2025 DrayTek warns of remote code execution bug in Vigor routers Networking hardware maker DrayTek released an advisory to warn about a security vulnerability in several Vigor router models that could allow…
Security2 Min Read October 2, 2025 HackerOne paid $81 million in bug bounties over the past year Bug bounty platform HackerOne has paid $81 million in rewards to white-hat hackers worldwide over the past 12 months. HackerOne manages over…
Microsoft Security2 Min Read October 2, 2025 Microsoft Defender bug triggers erroneous BIOS update alerts Microsoft is working to resolve a bug that causes Defender for Endpoint to incorrectly tag some devices' BIOS (Basic Input/Output…
Bishop Fox Cybersecurity IoT Privacy Security Vulnerability YoLink YoLink Smart Hub2 Min Read October 2, 2025 $20 YoLink IoT Gateway Vulnerabilities Put Home Security at Risk Cybersecurity researchers at Bishop Fox have revealed security vulnerabilities in the popular, inexpensive YoLink Smart Hub (v0382), leaving…
AI Artificial Intelligence Cybersecurity Gemini AI Gemini Trifecta Google Security Vulnerability2 Min Read October 2, 2025 Google Patches “Gemini Trifecta” Vulnerabilities in Gemini AI Suite Cybersecurity researchers at Tenable recently discovered three critical security flaws within Google’s Gemini AI assistant suite, which…
Security3 Min Read October 2, 2025 Android spyware campaigns impersonate Signal and ToTok messengers Two new spyware campaigns that researchers call ProSpy and ToSpy lured Android users with fake upgrades or plugins for the Signal and ToTok…
Blackpoint Cyber Cyber Attack Cybersecurity Fraud Malware Phishing Phishing Scam PowerShell Scam Security Windows3 Min Read October 2, 2025 Malicious ZIP Files Use Windows Shortcuts to Drop Malware A new wave of phishing attacks has been detected by the cybersecurity research firm, Blackpoint Cyber, that is exploiting users’ trust…
AI Artificial Intelligence Cybersecurity Ransomware Security SMB3 Min Read October 2, 2025 Small Businesses and Ransomware: Navigating the AI Era Threat Ransomware has evolved from a niche hacker tactic into a mainstream threat, and small businesses are increasingly in the crosshairs. While…
Security2 Min Read October 2, 2025 Red Hat confirms security incident after hackers claim GitHub breach An extortion group calling itself the Crimson Collective claims to have breached Red Hat's private GitHub repositories, stealing nearly 570GB…
Security3 Min Read October 2, 2025 Red Hat confirms security incident after hackers breach GitLab instance Correction: After publishing, Red Hat confirmed that it was a breach of one of its GitLab instances, and not GitHub. Title and story updated.…
Security3 Min Read October 2, 2025 Clop extortion emails claim theft of Oracle E-Business Suite data Mandiant and Google are tracking a new extortion campaign where executives at multiple companies received emails claiming that sensitive data…
Security2 Min Read October 1, 2025 Data breach at dealership software provider impacts 766k clients A ransomware attack at Motility Software Solutions, a provider of dealer management software (DMS), has exposed the sensitive data of 766,000…
Airline Canada Cyber Attack Cyber Attacks Cybersecurity Passport Privacy Security WestJet3 Min Read October 1, 2025 WestJet Confirms Passenger IDs and Passports Stolen in Cyberattack WestJet, a leading Canadian airline based in Calgary, has confirmed that a cybersecurity attack exposed personal information belonging to some…
Security3 Min Read October 1, 2025 Adobe Analytics bug leaked customer tracking data to other tenants Adobe is warning its Analytics customers that an ingestion bug caused data from some organizations to appear in the analytics instances…
Mobile Security3 Min Read October 1, 2025 Android malware uses VNC to give attackers hands-on access A new Android banking and remote access trojan (RAT) dubbed Klopatra disguised as an IPTV and VPN app has infected more than 3,000…
Google Mobile Security3 Min Read October 1, 2025 F-Droid project threatened by Google's new dev registration rules F-Droid is warning that the project could reach an end due to Google’s new requirements for all Android developers to verify their…
Security3 Min Read October 1, 2025 WestJet data breach exposes travel details of 1.2 million customers This story was updated with new information on the number of customers impacted. Canadian airline WestJet is informing customers that the…
AI Cyber Attack Cyber Crime Cybersecurity FraudGPT MatrixPDF Phishing Security SpamGPT WormGPT2 Min Read October 1, 2025 Meet SpamGPT and MatrixPDF, AI Toolkits Driving Malware Attacks A new trend lately observed in the world of cybercrime is the demand for user-friendly, plug-and-play tools that make it easier for people…
Artificial Intelligence Google Security2 Min Read October 1, 2025 Google Drive for desktop gets AI-powered ransomware detection Google has begun rolling out a new AI-powered security feature for Google Drive desktop, which will automatically pause file syncing when it…
Security2 Min Read October 1, 2025 Allianz Life says July data breach impacts 1.5 million people Allianz Life has completed the investigation into the cyberattack it suffered in July and determined that nearly 1.5 million individuals are…
Cyber Attack Cyber Crime Cybersecurity Detour Dog DNS Infostealer Los Pollos Malware Security Strela Stealer2 Min Read October 1, 2025 Detour Dog’s DNS Hijacking Infects 30,000 Websites with Strela Stealer New research from Infoblox Threat Intel has revealed that an established, persistent group of cybercriminals, Detour Dog, has been silently…
Security2 Min Read September 30, 2025 New MatrixPDF toolkit turns PDFs into phishing and malware lures A new phishing and malware distribution toolkit called MatrixPDF allows attackers to convert ordinary PDF files into interactive lures that…
Afghanistan China Cyber Attack Cyber Attacks Cybersecurity IIServerCore Malware Mustang Panda NET-STAR Pakistan Phantom Taurus Security Winnti2 Min Read September 30, 2025 Chinese APT Phantom Taurus Targeted MS Exchange Servers Over 3 Years Researchers at Palo Alto Networks say a Chinese-linked cyberespionage group has been targeting foreign ministries, embassies, and…
Security2 Min Read September 30, 2025 WestJet confirms recent breach exposed customers' passports Canadian airline WestJet is informing customers that the cyberattack disclosed in June compromised their sensitive information, including…
Security2 Min Read September 30, 2025 Nearly 50,000 Cisco firewalls vulnerable to actively exploited flaws Roughly 50,000 Cisco Adaptive Security Appliance (ASA) and Firewall Threat Defense (FTD) appliances exposed on the public web are vulnerable…
Hacking News Malware Privacy RemoteCOM SCOUT Security Spying Spyware Surveillance2 Min Read September 30, 2025 Hack of US Surveillance Provider RemoteCOM Exposes Court Data A major data breach has compromised the personal records of nearly 14,000 individuals under court supervision, alongside contact information…
ClaimPix Cybersecurity Jeremiah Fowler Leaks Misconfiguration Privacy Security Vulnerability2 Min Read September 30, 2025 US Auto Insurance Platform ClaimPix Leaked 10.7TB of Records Online A massive collection of data belonging to customers of ClaimPix, an Illinois-based platform for managing auto insurance claims across the…
Cloud Hardware Security2 Min Read September 30, 2025 Critical WD My Cloud bug allows remote command injection Western Digital has released firmware updates for multiple My Cloud NAS models to patch a critical-severity vulnerability that could be…
Security2 Min Read September 30, 2025 Broadcom fixes high-severity VMware NSX bugs reported by NSA Broadcom has released security updates to patch two high-severity VMware NSX vulnerabilities reported by the U.S. National Security Agency…
AI Artificial Intelligence Fraud LLM Microsoft Phishing Phishing Scam Scam Security SVG3 Min Read September 30, 2025 Microsoft Flags AI Phishing Attack Hiding in SVG Files Forget the old, error-filled emails you could spot easily. Cybercriminals have completely upgraded their methods, using AI (Artificial…
Security2 Min Read September 29, 2025 UK convicts "Bitcoin Queen" in world’s largest cryptocurrency seizure The Metropolitan Police has secured a conviction in what is believed to be the world's largest cryptocurrency seizure, valued at more than…
Security2 Min Read September 29, 2025 Japan's largest brewer suspends operations due to cyberattack Asahi Group Holdings, Ltd (Asahi), the brewer of Japan’s top-selling beer, has disclosed a cyberattack that disrupted several of its…
Security3 Min Read September 29, 2025 Ransomware gang sought BBC reporter’s help in hacking media giant Threat actors claiming to represent the Medusa ransomware gang tempted a BBC correspondent to become an insider threat by offering a…