Tech News Blog

Hunters International 0

Hunters International: Ransomware Out, Data Theft In

The ransomware group Hunters International has announced the cessation of its operations in their previous form. According to cybersecurity firm Group-IB, members of the syndicate deemed the data encryption model unprofitable, high-risk, and largely...

Ascom Hacked - Scattered Spider 0

2FA Bypassed: Hackers Steal Codes, Breach Google, Apple

Several weeks ago, Argentine users began reporting unusual incidents of Telegram account compromises to cybersecurity experts. What made the situation particularly alarming was that the takeovers occurred without any action on the part of...

UAT-5918 CVE-2025-2783 0

Paris Talks: Global Push to Control Hacking Tools

This week, Paris became the stage for intricate diplomatic negotiations aimed at curbing the unchecked proliferation and use of commercial hacking tools. France and the United Kingdom jointly unveiled the Pall Mall Process, an...

Steam Phishing 0

Steam Now Top Target for Phishing: Guardio Report

In the first quarter of 2025, the gaming platform Steam unexpectedly topped the list of the most frequently impersonated brands by phishing actors. This revelation comes from Guardio, a cybersecurity firm, following an analysis...

Fake Passport 0

Fake Passport Generated by ChatGPT Bypasses Security

A LinkedIn user has demonstrated how a counterfeit passport, generated using ChatGPT-4o, successfully passed a digital identity verification process. The experiment ignited intense debate among cybersecurity professionals and cast serious doubt on the continued...

Apple Card Visa 0

Visa Bids $100M to Snag Apple Card Partnership

Previous reports suggested that Apple intends to terminate its Apple Card credit card partnership with Goldman Sachs. Following speculation that Apple might pivot to a collaboration with American Express, new claims have emerged indicating...

iOS 19 0

iOS 19: iPhone 11 and Newer Get the Update

Apple is set to host its Worldwide Developers Conference (WWDC) 2025 on June 9, during which the company will unveil the developer preview of iOS 19 and announce the list of supported devices for...

Hijack Loader 0

Hijack Loader Evolved: Stealthier, More Evasive Malware

Cybercriminals continue to refine their malware delivery mechanisms, and the latest iteration of Hijack Loader stands as a vivid testament to this trend. Researchers at Zscaler have uncovered a newly enhanced version of the...

North Korean Tech Jobs 0

North Korean Spies Infiltrate European Tech Jobs

North Korean IT operatives have increasingly infiltrated European companies under the guise of remote employees. According to Google’s Threat Intelligence Group, actors from the DPRK have ramped up activity in countries such as Germany,...

Fileless Crypto Mining 0

1,500 Servers Hijacked: Fileless Crypto Mining Attack Unveiled

In the course of an ongoing malicious campaign, over 1,500 PostgreSQL servers have been compromised and repurposed for covert cryptocurrency mining. Researchers at Wiz revealed that the attackers operate entirely in-memory, without writing files...