Featured
From Spy Tech to Pokémon: How CIA-Funded Technology Birthed a Gaming Sensation

Discover the unexpected journey of Pokémon Go from its origins in CIA-funded satellite technology to global gaming phenomenon. The story reveals how Niantic Labs' founder John Hanke transformed intelligence agency innovations into mainstream entertainment that captured millions.
Major French Hospital Data Breach Exposes Medical Records of 750,000 Patients

A devastating cyberattack at a Paris-area hospital has compromised two decades of sensitive patient data, including medical records and personal information of 750,000 individuals. French authorities are investigating as the stolen data surfaces on the dark web, prompting renewed focus on healthcare cybersecurity.
AI-Generated Influencers: The Dark Side of Instagram's Digital Deception

A disturbing trend of AI-generated accounts is plaguing Instagram by stealing and manipulating content from real creators. The investigation reveals hundreds of artificial accounts using deepfake technology to profit from stolen content while threatening legitimate creators' livelihoods.
Iranian Hackers Exploit Legitimate Remote Management Tools in Sophisticated Phishing Campaign

Sophos MDR team uncovers cyber campaign using legitimate remote monitoring software for malicious purposes, linked to Iranian threat group MuddyWater. The attackers deploy tools like Atera and Level RMM through sophisticated phishing techniques targeting organizations in Israel and the US.
GitHub Launches $1.25M Security Fund to Bolster Open Source Projects

GitHub introduces a $1.25 million fund to support 125 open-source projects with $10,000 grants and comprehensive security training. The initiative addresses critical gaps in open-source security funding, backed by major tech companies like Microsoft and American Express.
MITRE's 2024 Top 25 Software Vulnerabilities: Out-of-Bounds Write Tops Critical Security Threats

MITRE Corporation unveils its 2024 ranking of the most dangerous software weaknesses, with out-of-bounds write claiming the top spot followed by cross-site scripting and improper input validation. The annual list serves as a crucial guide for organizations to prioritize cybersecurity efforts and strengthen their software development practices.
Scattered Spider Cybercrime Gang Members Face Federal Charges in $11M Hacking Scheme

Five individuals linked to the notorious Scattered Spider cybercrime group have been charged with orchestrating sophisticated phishing campaigns targeting major companies. The group allegedly stole $11 million and sensitive data through SMS-based attacks, with connections to high-profile breaches including last year's MGM Casino ransomware incident.
Spotify Platform Exploited to Spread Pirated Software and Game Cheats

Cybersecurity researchers reveal malicious actors are using Spotify playlists and podcasts to distribute links to unauthorized downloads and harmful software. The exploitation of the popular streaming platform allows bad actors to bypass security measures while potentially exposing millions of users to malware and scams.
Ghost Tap: The Invisible Threat Draining Bank Accounts Through Contactless Payments

A new hacking technique called Ghost Tap allows cybercriminals to steal funds through contactless payments by exploiting NFCGate technology, enabling fraudulent purchases without physical access to cards. The attack combines banking malware and coordinated mules to relay tap-to-pay data globally within seconds.