Cyber espionage allegations: China's State Security Ministry has accused the U.S. NSA of conducting a prolonged cyberattack operation. Critical infrastructure target: The facility maintains and…
The weekly news underscored how fast risk is evolving across breaches, phishing ecosystems, and software supply chains. Leaders urged action rather than waiting and watching. …
Expanding operations: A threat actor has expanded its operations from China to Taiwan, Japan, and most recently, Malaysia, using evolving malware delivery tactics. Primary malware:…
International operation: A coordinated law enforcement action led to the arrest of 7 individuals and the takedown of a massive CaaS platform. Significant seizures: Authorities…
New partnership: Law enforcement agencies using Flock's platform will be able to request video footage from Ring camera owners. Voluntary participation: The system allows police…
Claimed attack: The Cl0p ransomware group has asserted responsibility for a data breach targeting American Airlines. Sector impacted: This incident places the transportation and storage…
Coordinated attack: Hackers breached the PA systems at four airports to broadcast unauthorized messages. Third-party flaw: A cloud-based software provider and an advertisement streaming service…
Pervasive incidents: Three-quarters of organizations experienced insider-driven data loss within the last 18 months, most incidents being unintentional. Significant impact: Almost half of organizations reported…
Account compromise: The official YouTube channel for the popular game Dota 2 was briefly compromised to promote a fraudulent cryptocurrency scheme. Fraudulent promotion: Hackers used…
Distribution vector: A new banking Trojan, named Maverick, is being distributed on a massive scale through WhatsApp messages. Worm-like spread: It hijacks the victim's WhatsApp…
Nation-state attack: Cybersecurity firm F5 has disclosed a security breach attributed to state-backed hackers reportedly linked to China. Prolonged dwell time: The threat actors allegedly…
Real-Time Monitoring: Threat Protection Pro™ scans dark web databases to detect stolen session cookies immediately. Instant Alerts: Users are notified directly in-browser to log out…
Open-Source Release: NordVPN’s Linux GUI code is now public on GitHub for transparency and collaboration. Snap Integration: The updated Snap package includes the GUI, simplifying…
Massive data leak: A breach of Vietnam Airlines' Salesforce CRM has exposed over 23 million records, including sensitive data of Vietnamese and foreign government officials.…
Multi-faceted attack: A threat actor deployed extensions that steal source code, hijack CPUs for cryptocurrency mining, and install remote backdoors. Widespread infection: At least 11…
Attack volume: Taiwan's government networks are facing an average of 2.8 million cyberattacks per day so far in 2025, a 17% increase from 2024. Disinformation…
Widespread exposure: Geostationary satellite signals are unencrypted, exposing sensitive consumer, corporate, and government communications. Low-cost interception: Researchers successfully intercepted a vast array of private data,…
Beta rollout: Mozilla will randomly select users to test the free, built-in Firefox VPN in the coming months. Feature details: Browser-only VPN hides IPs, encrypts traffic,…
For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: