Telegram abuse economy reveals how organized networks exploit privacy features to target ordinary women. At the same time, researchers uncovered a large system that distributes abusive and nonconsensual content across the platform. Importantly, this activity is not isolated and follows a structured model. As a result, the issue raises serious concerns about how privacy tools…
Fake Claude website malware is spreading through a targeted phishing campaign that exploits growing interest in AI tools. Attackers are creating convincing clone websites that mimic the official Claude platform. These sites trick users into downloading malicious software disguised as a legitimate application. This threat highlights how cybercriminals shift toward social engineering. Instead of breaking…
AI agent router attacks are creating new security risks for modern systems. Researchers warn that attackers can exploit how AI agents connect to external services. These attacks target API routers that handle communication between systems. This shift shows how threat actors adapt to new technologies. Instead of attacking systems directly, they now exploit trusted connections.…
The Marimo RCE vulnerability is under active exploitation, with attackers targeting exposed systems shortly after disclosure. The flaw allows unauthenticated remote code execution, giving threat actors direct access without needing valid credentials. This rapid exploitation shows how quickly attackers can act when critical flaws become public. Unauthenticated flaw enables direct access The Marimo RCE vulnerability…
Payroll pirate attacks are targeting Microsoft employees in Canada through advanced phishing campaigns designed to hijack accounts. Attackers use deceptive login pages and session interception techniques to gain access without triggering standard security alerts. This campaign shows how threat actors are shifting toward direct financial theft by exploiting trusted workplace systems. Phishing pages capture credentials…
The LucidRook malware campaign is targeting NGOs and universities through carefully crafted phishing attacks. Researchers link the activity to a threat group that focuses on specific organizations rather than mass distribution. This campaign shows how attackers are shifting toward precision targeting and stealth-based operations. Phishing emails initiate the attack chain Attackers deliver LucidRook malware through…
The ChipSoft ransomware attack has disrupted healthcare systems across the Netherlands, forcing hospitals to take critical IT services offline. The incident affects one of the country’s main healthcare software providers, which many hospitals rely on for daily operations. This situation shows how a single attack on a central vendor can quickly impact an entire healthcare…
The DOJ censorship settlement sets new limits on how US government agencies can engage with online speech. The agreement resolves a lawsuit that accused the Biden administration of supporting efforts to suppress certain viewpoints online. This development highlights growing legal pressure around government involvement in digital platforms and content moderation. Case focused on alleged suppression…
A major Hungarian password leak has exposed serious cybersecurity weaknesses just before a national election. Researchers discovered nearly 800 government email credentials circulating online. Many of these accounts belong to sensitive roles, which increases the potential impact. The incident shows how simple security mistakes can create large-scale risks without a direct system breach. Weak passwords…
A serious security risk has emerged as Iranian cyberattacks expose nearly 4,000 US industrial devices. Many of these systems remain accessible from the public internet, creating a large and dangerous attack surface. The situation highlights ongoing weaknesses in industrial cybersecurity and raises concerns about potential disruption to critical services. Internet-facing control systems increase risk The…