Cybersecurity

Keep up with cybersecurity threats, data privacy, hacking incidents, and digital protection strategies. Learn about security tools, expert insights, and best practices to safeguard your online presence.

DOGE Affiliate Takes Over US Government’s ID Platform

Greg Hogan, an affiliate of the Department of Government Efficiency (DOGE), has been appointed acting assistant commissioner of the Technology…

Read More »

Open source package with 1M monthly downloads stole user credentials

Attackers exploited a vulnerability in a GitHub action workflow to hijack the open-source package "element-data", downloaded over 1 million times…

Read More »

Elon Musk’s XChat App Resembles Facebook Messenger More Than Signal

XChat, a new encrypted messaging app for X users, launched with Elon Musk promoting it by criticizing rivals like Signal…

Read More »

Utility firm Itron discloses breach of internal IT network

Itron confirmed a cyberattack in April 2026 that breached specific internal systems, prompting an immediate response involving law enforcement and…

Read More »

White House Correspondents’ Dinner shooting sparks conspiracy theories

No one was injured in a Saturday night shooting at the White House Correspondents' Dinner, but immediate online conspiracy theories…

Read More »

Microsoft Teams Used to Deliver New Snow Malware

A threat group called UNC6692 uses social engineering via email bombing and Microsoft Teams to trick victims into installing the…

Read More »

Entra ID Admin Role Could Let Hackers Hijack Service Principals

Microsoft patched a critical privilege escalation flaw in Entra ID's Agent Identity Platform in April 2026, where the Agent ID…

Read More »

PlayStation DRM Glitch Sparks Fan Concerns

Reports emerged that Sony may have introduced a 30-day online check-in requirement for new digital games on PS4 and PS5,…

Read More »

Firestarter malware evades Cisco firewall updates and patches

U.S. and U.K. cybersecurity authorities warn of the custom-built Firestarter backdoor persisting on Cisco Firepower and Secure Firewall appliances, linked…

Read More »

Microsoft Entra passkeys for Windows arriving late April

Microsoft will launch passkey support for phishing-resistant passwordless authentication on Windows devices in late April 2026, with general availability by…

Read More »

BlackFile extortion group linked to rise in vishing attacks

BlackFile, a cybercriminal group active since February 2026, targets retail and hospitality sectors using vishing calls where attackers impersonate IT…

Read More »

Credential Management as a Financial Risk Control in DORA

DORA's Article 9 mandates that financial institutions implement least-privilege policies and strong authentication mechanisms (like FIDO2/WebAuthn), making credential security a…

Read More »

10,000+ Zimbra servers exposed to active XSS attacks

Over 10,000 unpatched Zimbra Collaboration Suite servers remain vulnerable to active exploitation of a cross-site scripting flaw (CVE-2025-48700), which allows…

Read More »

Bridging cloud systems and post-quantum security: Tresor Lisungu Oteko

AI deployment in enterprises is outpacing security, creating critical risks as systems are embedded into production without robust security frameworks.…

Read More »

AI Boom Revives Old Security Mistakes, Mandiant VP Warns

Enterprise AI adoption is reviving old, avoidable security failures as organizations focus on futuristic threats like LLM poisoning while neglecting…

Read More »

Indirect prompt injection attacks on AI: 6 ways to stop them

Indirect prompt injection attacks exploit AI's need to pull information from external sources, hiding malicious instructions in content that LLMs…

Read More »

Trigona ransomware deploys custom tool to steal data

Trigona ransomware attackers are using a custom command-line data theft tool called "uploader_client.exe" to accelerate file exfiltration while evading detection,…

Read More »

Google Favors General-Purpose Gemini Over Specialized Cybersecurity Models

Google Cloud will not develop a dedicated cybersecurity AI model, instead relying on its general-purpose Gemini 3.1 Pro, which it…

Read More »

UK warns Chinese hackers use proxy networks to evade detection

Chinese-linked hackers are increasingly using massive botnets composed of compromised consumer devices, particularly SOHO routers and IoT equipment, to obscure…

Read More »

NCSC device blocks HDMI cyber espionage attacks

The NCSC has developed SilentGlass, a plug-and-play hardware device that protects HDMI and DisplayPort connections from cyberattacks, addressing a security…

Read More »