News
Instant IP Launches Rapid Takedown Service to Combat IP Theft, Deepfakes, and Copycat Websites
1+ hour, 35+ min ago (65+ words) PRLog Instant IP Launches Rapid Takedown Service to Combat IP Theft, Deepfakes, and Copycat Websites - Pirated courses and digital products distributed without consent - Pirated Content " Unauthorized distribution of books, courses, or digital assets - False Websites " Copycat domains designed to mislead…...
Six thousand extensions, zero permission, one lawsuit for Linked In
1+ hour, 54+ min ago (571+ words) Linked In is facing legal action in the United States over allegations that it secretly monitored users" browsers by scanning thousands of installed extensions without clear consent. Two class-action lawsuits, filed in a California federal court, accuse the platform of…...
Ransomware surges across auto industry
4+ hour, 7+ min ago (207+ words) Cybersecurity risks across automotive and smart mobility escalated in 2025 as ransomware surged and artificial intelligence expanded the attack surface, according to a recent analysis. Upstream says ransomware was one of the fastest growing and most disruptive attack types in 2025, accounting…...
Fake Security Tool Spreads Lucid Rook in Taiwan Cyberattacks
1+ day, 4+ hour ago (653+ words) Hackers are using fake security tools and cleverly crafted phishing emails to secretly deploy a new malware family, Lucid Rook, against organizations in Taiwan. The campaign, tracked as UAT-10362, focuses on Taiwanese NGOs and likely universities and shows a high…...
UNC6783 Hackers Use Fake Okta Pages in Corporate Breach Campaign
2+ hour, 4+ min ago (370+ words) Cybersecurity experts at Google Threat Intelligence Group (GTIG) have issued a warning about a new group of hackers, known as UNC6783, who are trying to steal data from large companies for data theft extortion. Austin Larsen, a lead analyst at GTIG,…...
China supercomputer hacked: Here's everything to know about hackers "Flaming China"
1+ hour, 57+ min ago (262+ words) Published April 10, 2026 A hacking group has reportedly stolen more than 10 petabytes of Chinese sensitive data. The compromised data includes defense documents and missile schematics. The experts mark the breach as a potentially historic hacking incident where the data from one…...
UAT-10362 linked to Lucid Rook attacks targeting Taiwan-based institutions
2+ hour, 55+ min ago (371+ words) Engage Lab SDK flaw opens door to private data on 50 M Android devices Bitcoin Depot hack leads to $3. 6 M Bitcoin theft via stolen credentials Eurail data breach impacted 308, 777 people Malicious PDF reveals active Adobe Reader zero-day in the wild Masjesu…...
Kryvyi Rih "hacker" at 16: Teenager hacked the parcel locker system and stole parcels worth half a million - "
17+ hour, 31+ min ago (113+ words) Kryvyi Rih "hacker" at 16: Teenager hacked the parcel locker system and stole parcels worth half a million" In Kryvyi Rih, law enforcement officers exposed a 16-year-old boy who hacks into the parcel machine system and stole parcels worth almost 500 thousand…...
Poisoned "Office 365" search results lead to stolen paychecks
2+ hour, 56+ min ago (442+ words) The group, which Microsoft tracks as Storm-2755, begins by poisoning search engine results and running malicious ads against generic queries like "Office 365, or even common misspellings like "Office 265. Victims who click through land on a convincing but fake Microsoft 365 login…...
Muddy Water Turns to Russian Malware-as-a-Service in New Chain Shell Campaign
4+ hour, 17+ min ago (626+ words) Iranian state-backed hacking group Muddy Water has made a decisive operational shift, adopting a Russian-built Malware-as-a-Service platform to power a new campaign against Israeli targets. The operation, built around a previously unknown tool called Chain Shell, marks a clear departure…...