Category: Cyber Security


  • SMS blaster Toronto arrests expose new mobile cybercrime method

    SMS blaster Toronto arrests reveal a new cybercrime technique that targets mobile users directly. Canadian authorities arrested three suspects linked to devices that mimic cell towers to send fraudulent messages. The case shows how attackers are shifting from online-only tactics to methods that exploit mobile network behavior. Fake cell towers enabled direct messaging attacks Investigators…

  • Silk Typhoon hacker extradited to US in cyberespionage case

    A Silk Typhoon hacker extradited to the United States marks a major step in a high-profile cyberespionage case. Authorities transferred the suspect from Italy to face charges linked to attacks on research institutions and critical systems. The case highlights how international cooperation is becoming central to tracking and prosecuting state-linked cyber activity. Arrest in Italy…

  • Browser extensions sell user data across millions of users

    Research confirms that browser extensions sell user data at a large scale, affecting millions of users worldwide. Many of these extensions appear harmless, yet they collect browsing activity and pass it to third parties. This issue highlights how everyday tools can quietly turn personal data into a commodity. Research uncovers large-scale data collection Security researchers…

  • Telegram cybercrime Korea revealed in bakjebang abuse network

    The Telegram cybercrime Korea case has exposed a disturbing abuse network built around doxxing and exploitation. Authorities arrested three teenagers linked to “bakjebang” channels that targeted women using leaked personal data. This case shows how quickly online harassment can evolve into structured cybercrime when platforms allow anonymous coordination and content sharing. Bakjebang network built on…

  • Firestarter malware survives Cisco firewall patches

    Firestarter malware can remain active on Cisco firewall devices even after security updates are applied. This discovery raises serious concerns about long-term access inside critical network environments. Malware targets core network infrastructure Security agencies warn that the threat focuses on Cisco Firepower and Secure Firewall systems running ASA or FTD software. These platforms protect enterprise…

  • Pre-Stuxnet malware may have targeted Iran program earlier

    New findings suggest pre-Stuxnet malware targeted Iran’s nuclear program years before the well-known Stuxnet attack. The discovery points to earlier cyber operations aimed at disrupting sensitive research. Researchers identify early malware framework Security analysts uncovered a tool known as fast16, believed to date back to around 2005. The malware appears designed to spread quietly across…

  • Fake CAPTCHA scam triggers $30 premium message charges

    A fake CAPTCHA scam is tricking users into sending premium SMS messages without realizing it. Victims often discover the issue only after seeing unexpected charges on their phone bills. Fake verification pages hide malicious actions Attackers use fake CAPTCHA pages that closely mimic legitimate verification systems. The prompts appear simple and familiar, which lowers suspicion…

  • Self-hosted GitHub alternative launched in Netherlands

    The Netherlands has introduced a self-hosted GitHub alternative to strengthen control over public sector software. The move reflects rising concern about relying on external platforms for critical development work. Government shifts away from external platforms Dutch authorities created the platform to host open-source projects developed within government institutions. The goal is to reduce dependence on…

  • Windows Insider program revamped with new testing channels

    The Windows Insider program is undergoing a major revamp as Microsoft works to improve testing and feedback. The update reflects ongoing efforts to address reliability concerns in Windows 11. New Testing Channels Introduced Microsoft is introducing changes to how preview builds are delivered. The updated structure adds a new Experimental channel alongside existing options. This…

  • Teams malware attack deploys Snow malware via impersonation

    A Teams malware attack is targeting employees by abusing Microsoft Teams to deliver a new threat known as Snow malware. The campaign shows how attackers use trusted platforms to bypass traditional defenses. Impersonation Drives the Attack Threat actors contact employees through Teams while posing as IT support staff. This tactic relies on social engineering to…