Cybersecurity Hacking News19 Min Read February 2, 2026 ⚡ Weekly Recap: Proxy Botnet, Office Zero-Day, MongoDB Ransoms, AI Hijacks & New Threats Every week brings new discoveries, attacks, and defenses that shape the state of cybersecurity. Some threats are stopped quickly, while others…
Developer Tools Malware3 Min Read February 2, 2026 Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm Cybersecurity researchers have disclosed details of a supply chain attack targeting the Open VSX Registry in which unidentified threat actors…
Artificial Intelligence Economic Espionage3 Min Read January 30, 2026 Ex-Google Engineer Convicted for Stealing 2,000 AI Trade Secrets for China Startup A former Google engineer accused of stealing thousands of the company's confidential documents to build a startup in China has been convicted…
Cybersecurity Hacking News19 Min Read January 29, 2026 ThreatsDay Bulletin: New RCEs, Darknet Busts, Kernel Bugs & 25+ More Stories This week's updates show how small changes can create real problems. Not loud incidents, but quiet shifts that are easy to miss until they add…
Cybersecurity Malware3 Min Read December 31, 2025 Researchers Spot Modified Shai-Hulud Worm Testing Payload on npm Registry Cybersecurity researchers have disclosed details of what appears to be a new strain of Shai Hulud on the npm registry with slight…
Endpoint Security Threat Intelligence,4 Min Read December 26, 2025 China-Linked Evasive Panda Ran DNS Poisoning Campaign to Deliver MgBot Malware A China-linked advanced persistent threat (APT) group has been attributed to a highly-targeted cyber espionage campaign in which the adversary…
Endpoint Security Malware2 Min Read December 24, 2025 New MacSync macOS Stealer Uses Signed App to Bypass Apple Gatekeeper Cybersecurity researchers have discovered a new variant of a macOS information stealer called MacSync that's delivered by means of a digitally…
Antitrust Privacy2 Min Read December 24, 2025 Italy Fines Apple €98.6 Million Over ATT Rules Limiting App Store Competition Apple has been fined €98.6 million ($116 million) by Italy's antitrust authority after finding that the company's App Tracking…
Cybersecurity Hacking News11 Min Read December 18, 2025 ThreatsDay Bulletin: WhatsApp Hijacks, MCP Leaks, AI Recon, React2Shell Exploit and 15 More Stories This week's ThreatsDay Bulletin tracks how attackers keep reshaping old tools and finding new angles in familiar systems. Small changes in…
Cybersecurity Hacking News17 Min Read December 15, 2025 ⚡ Weekly Recap: Apple 0-Days, WinRAR Exploit, LastPass Fines, .NET RCE, OAuth Scams & More If you use a smartphone, browse the web, or unzip files on your computer, you are in the crosshairs this week. Hackers are currently…
Vulnerability Zero-Day2 Min Read December 13, 2025 Apple Issues Security Updates After Two WebKit Flaws Found Exploited in the Wild Apple on Friday released security updates for iOS, iPadOS, macOS, tvOS, watchOS, visionOS, and its Safari web browser to address two security…
Data Breach Malware Ransomware Vulnerabilities15 Min Read December 11, 2025 ThreatsDay Bulletin: Spyware Alerts, Mirai Strikes, Docker Leaks, ValleyRAT Rootkit — and 20 More Stories This week's cyber stories show how fast the online world can turn risky. Hackers are sneaking malware into movie downloads, browser add-ons,…
Vulnerability Zero-Day2 Min Read December 11, 2025 Chrome Targeted by Active In-the-Wild Exploit Tied to Undisclosed High-Severity Flaw Google on Wednesday shipped security updates for its Chrome browser to address three security flaws, including one it said has come under…
Cybersecurity Hacking News14 Min Read December 8, 2025 ⚡ Weekly Recap: USB Malware, React2Shell, WhatsApp Worms, AI IDE Bugs & More It's been a week of chaos in code and calm in headlines. A bug that broke the internet's favorite framework, hackers chasing AI tools, fake…
Mobile Security Zero Day5 Min Read December 5, 2025 Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery A human rights lawyer from Pakistan's Balochistan province received a suspicious link on WhatsApp from an unknown number, marking the first…
Cybersecurity Hacking News14 Min Read November 27, 2025 ThreatsDay Bulletin: AI Malware, Voice Bot Flaws, Crypto Laundering, IoT Attacks — and 20 More Stories Hackers have been busy again this week. From fake voice calls and AI-powered malware to huge money-laundering busts and new scams, there's a…
Cybersecurity Hacking News14 Min Read November 24, 2025 ⚡ Weekly Recap: Fortinet Exploit, Chrome 0-Day, BadIIS Malware, Record DDoS, SaaS Breach & More This week saw a lot of new cyber trouble. Hackers hit Fortinet and Chrome with new 0-day bugs. They also broke into supply chains and SaaS…
Data Protection Technology3 Min Read November 21, 2025 Google Brings AirDrop Compatibility to Android’s Quick Share Using Rust-Hardened Security In a surprise move, Google on Thursday announced that it has updated Quick Share, its peer-to-peer file transfer service, to work with Apple's…
Cybersecurity Hacking News11 Min Read November 20, 2025 ThreatsDay Bulletin: 0-Days, LinkedIn Spies, Crypto Crimes, IoT Flaws and New Malware Waves This week has been crazy in the world of hacking and online security. From Thailand to London to the US, we've seen arrests, spies at work,…
Cybersecurity Hacking News20 Min Read November 17, 2025 ⚡ Weekly Recap: Fortinet Exploited, China's AI Hacks, PhaaS Empire Falls & More This week showed just how fast things can go wrong when no one's watching. Some attacks were silent and sneaky. Others used tools we trust…
Cybercrime Malware3 Min Read November 12, 2025 Google Sues China-Based Hackers Behind $1 Billion Lighthouse Phishing Platform Google has filed a civil lawsuit in the U.S. District Court for the Southern District of New York (SDNY) against China-based hackers who are…
Patch Tuesday Vulnerability3 Min Read November 12, 2025 Microsoft Fixes 63 Security Flaws, Including a Windows Kernel Zero-Day Under Active Attack Microsoft on Tuesday released patches for 63 new security vulnerabilities identified in its software, including one that has come under active…
Cybersecurity Hacking News14 Min Read November 10, 2025 ⚡ Weekly Recap: Hyper-V Malware, Malicious AI Bots, RDP Exploits, WhatsApp Lockdown and More Cyber threats didn't slow down last week—and attackers are getting smarter. We're seeing malware hidden in virtual machines,…
Mobile Security Vulnerability4 Min Read November 7, 2025 Samsung Mobile Flaw Exploited as Zero-Day to Deploy LANDFALL Android Spyware A now-patched security flaw in Samsung Galaxy Android devices was exploited as a zero-day to deliver a "commercial-grade" Android spyware…
Artificial Intelligence Vulnerability5 Min Read November 5, 2025 Researchers Find ChatGPT Vulnerabilities That Let Attackers Trick AI Into Leaking Data Cybersecurity researchers have disclosed a new set of vulnerabilities impacting OpenAI's ChatGPT artificial intelligence (AI) chatbot that…
Browser Security Vulnerability2 Min Read October 30, 2025 New "Brash" Exploit Crashes Chromium Browsers Instantly with a Single Malicious URL A severe vulnerability disclosed in Chromium's Blink rendering engine can be exploited to crash many Chromium-based browsers within a few…
Data Breach Malware6 Min Read October 28, 2025 Researchers Expose GhostCall and GhostHire: BlueNoroff's New Malware Chains Threat actors tied to North Korea have been observed targeting the Web3 and blockchain sectors as part of twin campaigns tracked as GhostCall…
Cybersecurity Hacking News22 Min Read October 27, 2025 ⚡ Weekly Recap: WSUS Exploited, LockBit 5.0 Returns, Telegram Backdoor, F5 Breach Widens Security, trust, and stability — once the pillars of our digital world — are now the tools attackers turn against us. From stolen…
Data Security Threat Intelligence2 Min Read October 20, 2025 Five New Exploited Bugs Land in CISA's Catalog — Oracle and Microsoft Among Targets The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added five security flaws to its Known Exploited Vulnerabilities…
Cloud Security Malware3 Min Read October 16, 2025 Hackers Abuse Blockchain Smart Contracts to Spread Malware via Infected WordPress Sites A financially motivated threat actor codenamed UNC5142 has been observed abusing blockchain smart contracts as a way to facilitate the…
Cybersecurity Hacking News15 Min Read October 16, 2025 ThreatsDay Bulletin: $15B Crypto Bust, Satellite Spying, Billion-Dollar Smishing, Android RATs & More The online world is changing fast. Every week, new scams, hacks, and tricks show how easy it's become to turn everyday technology into a…
Apple APT Groups IoT Security Vulnerabilities2 Min Read October 16, 2025 Apple Planning $350 Smart Display (2026) and Robotic Desktop Device (2027), Manufactured in Vietnam According to a report by Bloomberg News, Apple is actively expanding its smart home product line, with plans to launch a smart display…
Browser Security Data Protection3 Min Read October 15, 2025 How Attackers Bypass Synced Passkeys TLDR Even if you take nothing else away from this piece, if your organization is evaluating passkey deployments, it is insecure to deploy…
Android Apple Data Breach Vulnerabilities2 Min Read October 15, 2025 Samsung Sets Oct 21 Event to Unveil “Project Moohan,” Its Android XR Headset Rival to Vision Pro Samsung data breach Samsung has announced that it will host a new product unveiling event titled “Worlds Wide Open” on October 21…
Apple2 Min Read October 14, 2025 Apple Hit with Second Lawsuit Alleging AI Training Used Pirated Books from “Shadow Libraries” After previously being accused of using pirated books to train its artificial intelligence models, Apple now faces yet another class-action…
Apple Ransomware Supply Chain2 Min Read October 14, 2025 iPhone Fold Hinge Costs Drop to $70-$80, Boosting Viability for Mass Production in 2026 The long-rumored foldable iPhone — tentatively referred to as the iPhone Fold — has yet to be officially announced, but numerous…
Cybersecurity Hacking News2 Min Read October 13, 2025 Weekly Recap: WhatsApp Worm, Critical CVEs, Oracle 0-Day, Ransomware Cartel & More Every week, the cyber world reminds us that silence doesn't mean safety. Attacks often begin quietly — one unpatched flaw, one…
Cloud Security Malware Ransomware Vulnerabilities2 Min Read October 13, 2025 Apple Bug Bounty Payouts Can Now Top $5m Apple has doubled its top award for ethical hacking discoveries to $2m, although security researchers could earn even more if they’re…
Security2 Min Read October 10, 2025 Apple now offers $2 million for zero-click RCE vulnerabilities Apple is announcing a major expansion and redesign of its bug bounty program, doubling maximum payouts, adding new research categories,…
Apple Vulnerabilities Windows4 Min Read October 10, 2025 October 2025 Patch Tuesday forecast: The end of a decade with Microsoft A lot of classic software is reaching end-of-life (EOL) this month. Windows 10, Office 2016 and Exchange Server 2016 have survived after…
Microsoft2 Min Read October 9, 2025 Microsoft Defender mistakenly flags SQL Server as end-of-life Microsoft is working to resolve a known issue that causes its Defender for Endpoint enterprise endpoint security platform to…
Cybersecurity Hacking News1 Min Read October 9, 2025 ThreatsDay Bulletin: MS Teams Hack, MFA Hijacking, $2B Crypto Heist, Apple Siri Probe & More Cyber threats are evolving faster than ever. Attackers now combine social engineering, AI-driven manipulation, and cloud exploitation to…