Cybersecurity researchers have discovered a new campaign in which a cluster of 108 Google Chrome extensions has been found to communicate with the same command-and-control (C2) infrastructure with the…
cyberintel.kalymoon.com · 4843 articles · updated every 4 hours · grows forever
Cybersecurity researchers have discovered a new campaign in which a cluster of 108 Google Chrome extensions has been found to communicate with the same command-and-control (C2) infrastructure with the…
OX Security recently analyzed 216 million security findings across 250 organizations over a 90-day period. The primary takeaway: while raw alert volume grew by 52% year-over-year, prioritized critical…
A nascent Android remote access trojan called Mirax has been observed actively targeting Spanish-speaking countries, with campaigns reaching more than 220,000 accounts on Facebook, Instagram, Messenge…
Despite Chinese hacks, Trump's FCC votes to scrap cybersecurity rules for phone and internet companies TechCrunch
Interesting paper: “ What hackers talk about when they talk about AI: Early-stage diffusion of a cybercrime innovation. ” Abstract: The rapid expansion of artificial intelligence (AI) is raising conce…
A dangerous malware campaign has been silently targeting cryptocurrency users by hiding inside a fake version of Proxifier, a popular proxy software tool. Threat actors set up a GitHub repository desi…
Deutschland ist im Visier staatlicher Hacker. Mdisk – shutterstock.com Hybride Attacken auf kritische Infrastruktur in Deutschland und Bundeswehr-Truppen im Ausland nehmen weiter zu. Spätestens seit 2…
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added half a dozen security flaws to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitatio…
A critical security vulnerability impacting ShowDoc, a document management and collaboration service popular in China, has come under active exploitation in the wild. The vulnerability in question is …
Compliance, cybersecurity and V2G to dominate UK EV charging market in 2026 Fleet World
Taiwan cybersecurity firms attend Japan IT expo Taiwan News
Rockstar Games has confirmed a data breach after the notorious hacking group ShinyHunters exploited a third-party integration to access the company’s internal Snowflake data warehouse, ultimately leak…
The 20 Enterprise AI Cybersecurity CEOs You Need to Know in 2026 AI Insider
Why Cyber Risk Is Now Shaped as Much by Nations as by Hackers Wars are becoming more frequent, and are no longer only kinetic. They are just as active in the cyber world, with impacts much larger than…
Veteran Hardware Hacker's Chip Facilitates More Trustworthy and Secure Devices How can we trust hardware to not betray us? Enter the Baochip-1x, a piece of largely open-source silicon created by Andre…
Patients Allege Health Entities Did Not Get Consent to Record Conversations Proposed federal class action litigation alleges that two California healthcare organizations violated patient privacy in th…
Ex-Microsoft CIO: Mythos Could Surface Known Flaws Faster Than Vendors Can Fix Them Former Microsoft CIO Jim DuBois and IDC’s Frank Dickson say Claude Mythos Preview could rapidly surface long-known b…
Over the past week, reaction to Anthropic’s Glasswing disclosure has split along familiar lines. At one end: alarm over an AI system capable of autonomously identifying and exploiting vulnerabilities.…
An attacker has been using maliciously crafted PDF files to exploit a zero-day in Adobe Acrobat and Reader for at least four months.
Security experts warn of an "AI vulnerability storm" triggered by the introduction of Anthropic's Claude Mythos in a new paper from the Cloud Security Alliance (CSA).
Rockstar Games has suffered a data breach linked to a recent security incident at Anodot, with the ShinyHunters extortion gang now leaking the stolen data on its data leak site. [...]
Dutch fitness giant Basic-Fit announced that hackers breached its systems and gained access to information belonging to a million of its customers. [...]
Dwindling federal cyber support for critical infrastructure raises alarms Cybersecurity Dive
Cybersecurity Stocks Face AI-Driven Sentiment Reset in 2026 - News and Statistics IndexBox