Category: Data Breaches

Your blog category

  • Google Launches ‘Private AI Compute’ — Secure AI Processing with On-Device-Level Privacy

    Google Launches ‘Private AI Compute’ — Secure AI Processing with On-Device-Level Privacy

    Google on Tuesday unveiled a new privacy-enhancing technology called Private AI Compute to process artificial intelligence (AI) queries in a secure platform in the cloud.
    The company said it has built Private AI Compute to “unlock the full speed and power of Gemini cloud models for AI experiences, while ensuring your personal data stays private to you and is not accessible to anyone else, not

  • WhatsApp Malware ‘Maverick’ Hijacks Browser Sessions to Target Brazil’s Biggest Banks

    WhatsApp Malware ‘Maverick’ Hijacks Browser Sessions to Target Brazil’s Biggest Banks

    Threat hunters have uncovered similarities between a banking malware called Coyote and a newly disclosed malicious program dubbed Maverick that has been propagated via WhatsApp.
    According to a report from CyberProof, both malware strains are written in .NET, target Brazilian users and banks, and feature identical functionality to decrypt, targeting banking URLs and monitor banking applications.

  • CISO’s Expert Guide To AI Supply Chain Attacks

    CISO’s Expert Guide To AI Supply Chain Attacks

    AI-enabled supply chain attacks jumped 156% last year. Discover why traditional defenses are failing and what CISOs must do now to protect their organizations.
    Download the full CISO’s expert guide to AI Supply chain attacks here. 
    TL;DR

    AI-enabled supply chain attacks are exploding in scale and sophistication – Malicious package uploads to open-source repositories jumped 156% in

  • Researchers Detect Malicious npm Package Targeting GitHub-Owned Repositories

    Researchers Detect Malicious npm Package Targeting GitHub-Owned Repositories

    Cybersecurity researchers have discovered a malicious npm package named “@acitons/artifact” that typosquats the legitimate “@actions/artifact” package with the intent to target GitHub-owned repositories.
    “We think the intent was to have this script execute during a build of a GitHub-owned repository, exfiltrate the tokens available to the build environment, and then use those tokens to publish

  • Android Trojan ‘Fantasy Hub’ Malware Service Turns Telegram Into a Hub for Hackers

    Android Trojan ‘Fantasy Hub’ Malware Service Turns Telegram Into a Hub for Hackers

    Cybersecurity researchers have disclosed details of a new Android remote access trojan (RAT) called Fantasy Hub that’s sold on Russian-speaking Telegram channels under a Malware-as-a-Service (MaaS) model.
    According to its seller, the malware enables device control and espionage, allowing threat actors to collect SMS messages, contacts, call logs, images, and videos, as well as intercept, reply,

  • Hackers Exploiting Triofox Flaw to Install Remote Access Tools via Antivirus Feature

    Hackers Exploiting Triofox Flaw to Install Remote Access Tools via Antivirus Feature

    Google’s Mandiant Threat Defense on Monday said it discovered n-day exploitation of a now-patched security flaw in Gladinet’s Triofox file-sharing and remote access platform.
    The critical vulnerability, tracked as CVE-2025-12480 (CVSS score: 9.1), allows an attacker to bypass authentication and access the configuration pages, resulting in the upload and execution of arbitrary payloads. 
    The

  • Konni Hackers Turn Google’s Find Hub into a Remote Data-Wiping Weapon

    Konni Hackers Turn Google’s Find Hub into a Remote Data-Wiping Weapon

    The North Korea-affiliated threat actor known as Konni (aka Earth Imp, Opal Sleet, Osmium, TA406, and Vedalia) has been attributed to a new set of attacks targeting both Android and Windows devices for data theft and remote control.
    “Attackers impersonated psychological counselors and North Korean human rights activists, distributing malware disguised as stress-relief programs,” the Genians

  • ⚡ Weekly Recap: Hyper-V Malware, Malicious AI Bots, RDP Exploits, WhatsApp Lockdown and More

    ⚡ Weekly Recap: Hyper-V Malware, Malicious AI Bots, RDP Exploits, WhatsApp Lockdown and More

    Cyber threats didn’t slow down last week—and attackers are getting smarter. We’re seeing malware hidden in virtual machines, side-channel leaks exposing AI chats, and spyware quietly targeting Android devices in the wild.
    But that’s just the surface. From sleeper logic bombs to a fresh alliance between major threat groups, this week’s roundup highlights a clear shift: cybercrime is evolving fast

  • New Browser Security Report Reveals Emerging Threats for Enterprises

    New Browser Security Report Reveals Emerging Threats for Enterprises

    According to the new Browser Security Report 2025, security leaders are discovering that most identity, SaaS, and AI-related risks converge in a single place, the user’s browser. Yet traditional controls like DLP, EDR, and SSE still operate one layer too low.
    What’s emerging isn’t just a blindspot. It’s a parallel threat surface: unmanaged extensions acting like supply chain implants, GenAI

  • Large-Scale ClickFix Phishing Attacks Target Hotel Systems with PureRAT Malware

    Large-Scale ClickFix Phishing Attacks Target Hotel Systems with PureRAT Malware

    Cybersecurity researchers have called attention to a massive phishing campaign targeting the hospitality industry that lures hotel managers to ClickFix-style pages and harvest their credentials by deploying malware like PureRAT.
    “The attacker’s modus operandi involved using a compromised email account to send malicious messages to multiple hotel establishments,” Sekoia said. “This campaign