A coordinated international operation has delivered significant results against a decentralized cybercrime network known as The Com. Under Europol Project Compass, authorities arrested 30 individuals and identified 179 additional suspects linked to the group. The operation reflects growing global cooperation aimed at dismantling online communities involved in exploitation, cyber extortion, and coordinated criminal activity. Law…
Underground ransomware infrastructure is facing renewed disruption as authorities intensify pressure on cybercrime networks. This ransomware roundup highlights three major developments: the seizure of the RAMP forum, a large-scale BreachForums account leak, and increasing scrutiny of Telegram as a communication hub for threat actors. Together, these events signal instability inside communities that ransomware groups depend…
A new extortion threat has emerged in the financial services sector after ShinyHunters claimed responsibility for a major intrusion at Pathstone Family Office. The ShinyHunters Pathstone data breach allegedly involves 641,000 stolen records, with the group warning that it will publish the data if its demands are not met. The situation adds to a growing…
Millions of telecom customers in the Netherlands now face uncertainty after a major data breach linked to Odido surfaced online. The ShinyHunters Odido leak has escalated quickly, with the extortion group beginning to publish allegedly stolen customer records on underground forums. The incident highlights the ongoing pressure large telecom providers face from organized cybercriminal networks…
The discovery that Google API keys expose Gemini data has raised serious concerns for developers and cloud administrators. API keys that developers once treated as non-sensitive identifiers can now grant access to Gemini AI endpoints if the Gemini API is enabled in the same Google Cloud project. This shift changes the security posture of thousands…
Trend Micro has warned customers about critical Trend Micro Apex One vulnerabilities that could allow remote attackers to execute arbitrary code on affected systems. The flaws impact the Apex One on-premises management console and carry severe security implications for organizations that expose these systems to untrusted networks. Because Apex One manages endpoint security policies across…
The Juniper PTX router vulnerability exposes critical backbone devices to full remote takeover. The flaw affects PTX Series routers running Junos OS Evolved and allows an unauthenticated attacker to execute arbitrary code with root privileges. Because these routers sit at the core of service provider and enterprise networks, the potential impact is severe. Juniper assigned…
The Olympique Marseille cyberattack became public after a threat actor claimed to have breached the club’s systems and leaked part of its data. The French Ligue 1 club acknowledged the incident following online posts that included alleged database samples. While the attacker described a large-scale compromise, the club continues to investigate the scope of the…
The Malaysia Airlines Qilin ransomware claim surfaced after the cybercrime group listed the airline on its dark web leak site. The post immediately raised concerns about a potential breach involving one of Southeast Asia’s largest carriers. However, the claim remains unverified, as no supporting evidence or stolen data has been released publicly. Ransomware groups often…
The Russia China scammers exploit ChatGPT story highlights how generative AI tools are increasingly being misused for fraud and influence operations. Recent threat intelligence findings show that organized networks linked to Russia and China used ChatGPT to produce scam content, fake documentation, and coordinated messaging campaigns. While AI systems include safeguards, determined actors continue testing…