A Vivaticket ransomware attack has disrupted access to major European museums, including high-profile venues that rely on the platform for ticketing. The breach did not target the institutions themselves. Instead, attackers hit a shared service that sits at the center of their operations. This incident shows how quickly disruption spreads when critical systems depend on…
The Die Linke ransomware attack has escalated after the party confirmed that attackers stole internal data. The Qilin group now threatens to publish the files, increasing pressure and raising concerns about political targeting. The incident shows how ransomware campaigns continue to intersect with political and strategic interests. Qilin group claims the attack The Qilin ransomware…
TA416 cyber espionage activity has resurfaced with a renewed focus on Europe. The China-linked threat group is once again targeting institutions connected to the EU and NATO, using quieter and more calculated methods than before. This shift reflects changing geopolitical priorities, as intelligence gathering becomes more focused on European diplomacy and security cooperation. TA416 refocuses…
A recent investigation has raised concerns about how LinkedIn may collect data from users’ browsers. Researchers claim the platform scans for installed extensions and links that data to user profiles, potentially without clear disclosure. Report points to undisclosed browser scanning The findings suggest LinkedIn runs code that checks which browser extensions users have installed. The…
A threat actor claims to have accessed a large dataset tied to Adobe’s support systems, potentially exposing millions of customer interactions and internal records. The company has not confirmed a breach. However, early analysis points to a compromise involving a third-party environment rather than Adobe’s core infrastructure. Dataset centers on support systems, not core platform…
A destructive cyberattack disrupted Stryker’s global operations after attackers wiped data across a large portion of its network. The incident did not follow the usual ransomware playbook. Instead of demanding payment, the attackers focused on disruption, using data destruction as the primary objective. Attack leveraged internal access to trigger data wipe Attackers gained access to…
Attackers are spreading a malicious WhatsApp clone that installs spyware on targeted devices. The campaign does not rely on vulnerabilities. Instead, it tricks users into installing the app, giving attackers direct access to messages, calls, and even the device’s camera and microphone. Fake app tricks users into granting access Attackers distribute a counterfeit version of…
Nacogdoches Memorial Hospital confirmed that attackers gained access to its network in mid-January. The intrusion remained active until January 31, 2026, when suspicious activity triggered an internal investigation. That gap matters. It gave attackers enough time to move through systems and access sensitive data before being detected. Incidents like this rarely involve a quick breach.…
Russian hackers messaging apps campaigns are expanding, with authorities warning about targeted attacks on WhatsApp and Signal users. The UK’s National Cyber Security Centre (NCSC) says threat actors are focusing on individuals with access to sensitive information. These attacks do not target encryption. Instead, they focus on gaining access to user accounts. Attackers target accounts,…
The Hasbro cyberattack has disrupted internal systems after unauthorized access was detected in the company’s network. In response, Hasbro took parts of its infrastructure offline to contain the incident. The company continues to operate using temporary processes. However, delays are expected while systems are restored and verified. Systems taken offline to contain the incident Hasbro…