CPUID Site Hijacked To Serve Malware Instead of HWMonitor Downloads
Incident Overview Attackers briefly hijacked part of CPUID’s backend and swapped legitimate download links on its site with malware‑laced ones. The issue affec...
Incident Overview Attackers briefly hijacked part of CPUID’s backend and swapped legitimate download links on its site with malware‑laced ones. The issue affec...
Welcome to this week’s security review. Below are the highlights from five recent articles. Prevention‑first cybersecurity takes center stage As breakout time a...
Background The FBI was able to forensically extract copies of incoming Signal messages from a defendant’s iPhone even after the app had been deleted. The data...
!https://www.bleepstatic.com/content/hl-images/2026/01/28/Hacker-typing.jpg Overview The attack surface targeted by Iranian‑linked hackers in cyberattacks again...
Cybersecurity researchers have flagged yet another evolution of the ongoing GlassWorm campaign, which employs a new Zig dropper that's designed to stealthily in...
While much of the discussion on AI security centers around protecting ‘shadow’ AI and GenAI consumption, there's a wide-open window nobody's guarding: AI browse...
!https://www.bleepstatic.com/content/hl-images/2025/09/03/AI-Hacker.jpg Threat actors using a previously undocumented phishing‑as‑a‑service PhaaS platform calle...
In 2021, Anjuna Security was growing fast, hiring aggressively, and chasing a market that seemed limitless. By the end of that year, the venture‑backed cybersec...
!https://www.bleepstatic.com/content/hl-images/2026/04/09/hospital.jpg Incident Overview Dutch healthcare software vendor ChipSoft was hit by a ransomware attac...
Background Six months ago, Mercor was flying high after raising a massive $350 million Series C that valued the AI data‑training startup at $10 billion. On Mar...
Background Six months ago, Mercor was flying high after raising a massive $350 million Series C that valued the AI data‑training startup at $10 billion. On Mar...
Overview An anonymous reader quoted a CNN report stating that a hacker allegedly stole a massive trove of sensitive data—including highly classified defense do...
!https://www.bleepstatic.com/content/hl-images/2023/06/16/Google-Chrome-headpic.jpg Google has rolled out Device Bound Session Credentials DBSC protection in Ch...
!https://www.bleepstatic.com/content/hl-images/2023/12/07/back-2.jpg Hackers hijacked the update system for the Smart Slider 3 Pro plugin for WordPress and Joom...
Incident Overview British oil and gas company Zephyr Energy reports that a hacker redirected a payment of £700,000 ≈ $1 million intended for a contractor into...
8:31 AM PDT · April 9, 2026 !A pulling unit or workover rig on an oil well in Utahhttps://techcrunch.com/wp-content/uploads/2026/04/utah-oil-derrick-1371861994....
Tax Day is nearly here, and with it comes tax scamshttps://mashable.com/article/google-tools-to-avoid-tax-season-scams. The U.S. Congressional Joint Economic Co...
Thursday. Another week, another batch of things that probably should've been caught sooner but weren't. This one's got some range — old vulnerabilities getting...
!https://www.bleepstatic.com/content/hl-images/2023/09/29/person-working-on-computers-cybersecurity.jpg Cyberattacks rarely come out of nowhere—threat actors of...
Current Focus I am currently a Computer Science student in my 4th semester. Up until now, my focus has been on building—UI/UX design, software architecture, an...
As AI tools become more accessible, employees are adopting them without formal approval from IT and security teams. While these tools may boost productivity, au...
Threat actors have been exploiting a previously unknown zero‑day vulnerability in Adobe Reader using maliciously crafted PDF documents since at least December 2...
ProPublica Report ProPublica has a scoop: In late 2024, the federal government’s cybersecurity evaluators rendered a troubling verdict on one of Microsoft’s bi...
An apparent hack‑for‑hire campaign likely orchestrated by a threat actor with suspected ties to the Indian government targeted journalists, activists, and gover...
!https://www.bleepstatic.com/content/hl-images/2026/04/09/High-speed_train_Europe.jpg Overview Eurail B.V., a European travel operator that provides digital pas...
!A security specialisthttps://cdn.mos.cms.futurecdn.net/foLY3NDKc2g2zqjwGgXPvc.jpg Image credit: Intel Overview A hacker—or hacker group—claims to have extracte...
!https://www.bleepstatic.com/content/hl-images/2026/04/09/Adobe.jpg Attackers have been exploiting a zero‑day vulnerability in Adobe Reader using maliciously cr...
You Think You’re Too Small to Matter Most startup founders don’t worry much about security in the early stages. There’s always something more urgent: shipping...
!https://www.bleepstatic.com/content/hl-images/2026/04/09/Bitcoin_Depot.jpg Incident Overview Bitcoin Depot, which operates one of the largest Bitcoin ATM netwo...
The recent news of the massive breach at the National Supercomputing Center in Tianjin NSCC is sending shockwaves through the tech world. While mainstream outle...
Overview The FBI reports that Iran‑linked hackers disrupted internet‑connected systems used by U.S. oil, gas, and water companies. Despite a recent two‑week ce...
!https://www.bleepstatic.com/content/hl-images/2026/04/08/raccoon.jpg Threat Actor Overview A threat actor tracked as UNC6783 is compromising business process o...
Hackers working on behalf of the Iranian government are disrupting operations at multiple U.S. critical infrastructure sites, likely in response to the country’...
!https://www.bleepstatic.com/content/hl-images/2021/10/22/Apple_Finder_Mac__headpic.jpg A new campaign delivering the Atomic Stealer malware to macOS users abus...
Security researchers say they have identified a hack‑for‑hire group targeting journalists, activists, and government officials across the Middle East and North...
Security researchers discovered a remote code execution RCE vulnerability in Apache ActiveMQ Classic that has gone undetected for 13 years and could be exploite...
Cybersecurity researchers have lifted the curtain on a stealthy botnet that's designed for distributed denial‑of‑service DDoS attacks. Called Masjesu, the botne...
Leak Details Cybercriminals have allegedly stolen a large amount of sensitive internal documents from the Los Angeles Police Department and leaked the data onl...
!Microsoft Abruptly Terminates VeraCrypt Account, Halting Windows Updateshttps://www.404media.co/content/images/size/w2000/2026/04/simon-ray-TICJQELFmg4-unsplas...
APT28 aka Forest Blizzard and Pawn Storm has been linked to a fresh spear‑phishing campaign targeting Ukraine and its allies to deploy a previously undocumented...
!FBI says cyber fraud cost Americans $21B last year – here's what you need to know | FBI meeting at a field officehttps://9to5mac.com/wp-content/uploads/sites/6...
The Fragmented State of Modern Enterprise Identity Enterprise IAM is approaching a breaking point. As organizations scale, identity becomes increasingly fragme...
Overview The UK National Cyber Security Centre NCSC published an advisory warning that the Russian state‑linked hacking group APT28 has been exploiting vulnera...
newshttps://www.truesec.com/hub/blog/malicious-pypi-package-litellm-supply-chain-compromise Details A malicious supply‑chain compromise has been identified in t...
Artificial Intelligence AI company Anthropic announced a new cybersecurity initiative called Project Glasswing that will use a preview version of its new fronti...
The North Korea‑linked persistent campaign known as Contagious Interview has spread its tentacles by publishing malicious packages targeting the Go, Rust, and P...
Overview Iran‑affiliated cyber actors are targeting internet‑facing operational technology OT devices across critical infrastructures in the United States, inc...
Overview A former Meta employee suspected of downloading around 30,000 private images of Facebook users is being investigated by the Metropolitan Police. The e...