French authorities have arrested a suspected hacker believed to be behind dozens of data breaches targeting public institutions, sports federations and private organizations across the country.
cyberintel.kalymoon.com · 4694 articles · updated every 4 hours · grows forever
French authorities have arrested a suspected hacker believed to be behind dozens of data breaches targeting public institutions, sports federations and private organizations across the country.
Hackers deployed a previously unknown wiper malware against Venezuela’s energy and utilities sector in an attack that appears to have been designed to destroy systems.
Researchers said the group stole up to $12 million in cryptocurrency in the first three months of 2026 through malware attacks on personal devices.
Blue checkmarks moved from social media profile pages to Gmail inboxes, and that shift carries more practical weight than most marketers have acknowledged. In 2023, Gmail began displaying verified blu…
A significant supply chain attack targeting the official checkmarx/kics Docker Hub repository, where threat actors pushed trojanized images capable of harvesting and exfiltrating sensitive developer c…
Application developers are being warned that malicious versions of pgserve, an embedded PostgreSQL server for application development, and automagik, an AI coding tool, have been dropped into the npm …
The Claude Mythos Preview appears to be living up to the hype, at least from a cybersecurity standpoint. The model, which Anthropic rolled out to a small group of users, including Firefox developer Mo…
Serial-to-Ethernet adapters used in industrial, retail, and healthcare environments to link serial devices to TCP/IP networks are riddled with vulnerabilities and outdated open-source components, rese…
Cyber impact of conflict in the Middle East, and other cybersecurity news The World Economic Forum
Cybersecurity Stocks Rise on Analyst AI Budget Forecasts | 2026 Market Update - News and Statistics IndexBox
Deal Would Help Cisco Expand Footprint Beyond Authentication, ITDR and ISPM Cisco's cyber M&A dry spell could soon come to an end, with the company reportedly in talks to acquire New York-based non-hu…
Pact Is Among Other Similar Biotech, AI Firm Collaborations to Speed Up Drug R&D Merck has struck a multi-year deal with Google Cloud worth up to $1 billion to enhance the pharmaceutical and life scie…
TrendAI's Tom Kellermann on Defending Against Agentic Attacks, APT Collaboration AI-driven threats now operate with speed, scale and persistence. Defenders need expanded telemetry, a global research t…
A company that ran anonymous tip lines for 35,000 American schools - handling reports of bullying, weapons, and self-harm - boasted on its website that it had suffered zero security breaches in over 2…
Cybercriminals are now using Google’s own advertising platform to steal cryptocurrency from unsuspecting users. They place fake ads that look exactly like real links to popular crypto applications, an…
A large-scale malware distribution campaign has been uncovered involving 109 fake GitHub repositories that were used to trick users into downloading two dangerous malware tools named SmartLoader and S…
Not nearly as polite as the name suggests, the ransomware gang has impressed researchers with its speed in scaling up operations — and its sophistication.
A new Mirai-based malware campaign is actively exploiting CVE-2025-29635, a high-severity command-injection vulnerability affecting D-Link DIR-823X routers, to enlist devices into the botnet. [...]
Apple has released out-of-band security updates for iPhone and iPad devices to fix a Notification Services flaw that could allow notifications marked for deletion to remain stored on the device. [...]
IFSCA Cyber Security Guidelines 2026: IFSC MIIs IndiaLaw LLP
Nation-State Hits Now Comprise Majority of Serious Incidents Probed by Government British intelligence officials said they investigate about four major incidents per week, with the majority involving …
AI Enthusiasts Haven't Used Model to Probe for Vulns, Source Tells Bloomberg An unauthorized group of users gained access to Claude Mythos Preview artificial intelligence model and have regularly used…
Nine out of ten cyber attacks start with phishing. When an incident occurs, it’s often a person who’s held accountable: a compromised employee or a SOC analyst who missed a signal. But in a corporate …
A previously undocumented remote access trojan (RAT) framework called Auraboros C2 has surfaced, exposing an alarming level of open access to victim data, live surveillance capabilities, and browser c…