Tech Company Develops Novel Detection System for Russia's Unjammable Fiber-Optic Drones

Thumbnail
1 min read

As Russian forces deploy sophisticated fiber-optic tethered drones that resist electronic jamming in Ukraine, American-Ukrainian company Kara Dag has developed an innovative detection system combining microphones and infrared lasers. The technology promises to help Ukrainian forces counter these dangerous weapons that have proven effective at destroying armored vehicles.

Cannabis Retailer STIIIZY Hit by Major Customer Data Breach, Exposing ID Documents

Thumbnail
1 min read

Premium cannabis retailer STIIIZY disclosed a significant data breach exposing customer identification documents and transaction records at multiple California locations. The Everest cybercrime group claimed responsibility for compromising hundreds of thousands of records through a vendor's point-of-sale system.

PayPal Users Targeted by Sophisticated Microsoft 365-Based Phishing Scam

Thumbnail
1 min read

A newly discovered phishing campaign exploits legitimate PayPal infrastructure and Microsoft 365 to hijack user accounts. The sophisticated attack bypasses traditional security by using authentic payment request notifications and URLs, making detection particularly challenging.

Chinese Hackers Exploit Critical Ivanti Vulnerability in Sophisticated Attack Campaign

Thumbnail
1 min read

UNC5337, a Chinese threat group, has launched a new attack exploiting a critical vulnerability in Ivanti Connect Secure devices, deploying sophisticated malware tools. Over 2,000 ICS instances may be vulnerable across multiple countries, prompting urgent patching and security measures.

New 'Fickle Stealer' Malware Emerges with Advanced Evasion and Data Theft Capabilities

Thumbnail
1 min read

A sophisticated Rust-based malware dubbed 'Fickle Stealer' has been discovered using multiple attack vectors and advanced anti-detection methods. The threat actively targets cryptocurrency wallets, browsers, and communication apps while employing complex techniques to evade security controls.

Former Disney Employee Faces Charges for Malicious Menu System Hack

Thumbnail
1 min read

A former Disney manager faces federal charges after hacking restaurant menu systems post-termination, dangerously altering allergen information and launching cyberattacks against colleagues. The case highlights cybersecurity vulnerabilities and potential real-world safety impacts of unauthorized system access.

Zuckerberg Accused of Approving Pirated Book Usage for Meta's AI Training

Thumbnail
1 min read

Meta CEO Mark Zuckerberg allegedly approved using unauthorized copyrighted books from LibGen to train the company's Llama AI model, according to a federal lawsuit. Internal communications reveal executives' concerns about public disclosure while engineers expressed hesitation about downloading pirated materials.

Location Data Scandal: Popular Apps Exposed in Massive Privacy Breach

Thumbnail
1 min read

Major apps like Candy Crush, Tinder, and MyFitnessPal are being exploited by advertising networks to secretly harvest users' location data on a massive scale. The leaked files from Gravy Analytics reveal how data brokers intercept ad systems to collect sensitive information that may end up in government hands.

Britain's Digital Dawn: The Historic First Connection to Arpanet

Thumbnail
1 min read

In 1973, University College London made history by establishing Britain's first connection to Arpanet, the internet's predecessor. From royal emails to pioneering security measures, this groundbreaking achievement positioned the UK as an early leader in the digital revolution.

Do not miss any updates.
Subscribe to the newsletter