The Canadian Investment Regulatory Organization (CIRO) confirmed that the data breach it suffered last year impacts about 750,000 Canadian investors. [...]
Another set of 17 malicious extensions linked to the GhostPoster campaign hasย been discovered in Chrome, Firefox, and Edge stores, where they accumulated a total ofย 840,000 installations. [...]
A cross-site scripting (XSS) flaw in the web-based control panel used by operators of the StealC info-stealing malware allowed researchers to observe active sessions and gather intelligence on the attackers' hardware. [...]
The identity of theย Black Basta ransomware gang leader has been confirmed by law enforcement in Ukraine and Germany, and the individual has been added to the wanted list of Europol and Interpol. [...]
An advanced threat actor tracked as UAT-8837 and believed to be linked to China has been focusing on critical infrastructure systems in North America, gaining access by exploiting both known and zero-day vulnerabilities. [...]
The Gootloader malware, typically used for initial access, is now using a malformed ZIP archive designed to evade detection by concatenating up to 1,000 archives. [...]
Hackers are actively exploiting a maximumย severity flaw in the Modular DS WordPress plugin that allows them to bypass authentication remotely and access the vulnerable sites withย admin-level privileges. [...]
Microsoft announced thatย the Copilot Studio extension for the Visual Studio Code (VS Code) integrated development environment is now available to all users. [...]
The Kyowon Group (Kyowon), a South Korean conglomerate, disclosed that a cyberattack has disrupted its operations and customer information may have been exposed in the incident. [...]
The French data protection authority (CNIL) has imposed cumulative fines of โฌ42 million on Free Mobile and its parent company, Free, for inadequate protection of customer data against cyber threats. [...]
Technical details and a public exploit have been published for a critical vulnerability affectingย Fortinet's Security Information and Event Management (SIEM) solution that could be leveraged by a remote, unauthenticated attacker to execute commands or code. [...]
Researchers identified an attack method dubbed "Reprompt" that could allow attackers to infiltrate a user's Microsoft Copilot session and issue commands to exfiltrate sensitive data. [...]
Officials of Ukraine's Defense Forces were targeted in a charity-themed campaign between October and December 2025 that delivered backdoor malware calledย PluggyApe. [...]
A newly discoveredย advanced cloud-native Linux malware frameworkย named VoidLink focuses on cloud environments, providing attackers with custom loaders, implants, rootkits, and plugins designed for modern infrastructures. [...]
The Amsterdam Court of Appeal sentenced a 44-year-old Dutch national to seven years in prison for multiple crimes, including computer hacking and attemptedย extortion. [...]
Hackers over the past six months have relied increasingly more on the browser-in-the-browser (BitB) method to trick users into providing Facebook account credentials. [...]
Apex Legends players over the weekend experienced disruptions during live matches as threat actors hijacked their characters, disconnected them,ย and changed their nicknames. [...]
Spanish energy provider Endesa and itsย Energรญa XXI operator are notifying customers that hackers accessed the company's systems and accessed contract-related information, which includes personal details. [...]