From weaponized telecom networks targeting diplomats in Moscow to AI-generated dev tools and disputed VPN exploits, 2025 is redefining the cyber threat landscape — and trust...
Hackers Exploited IVR System at Georgia’s SNAP Contractor, Threatening Sensitive EBT Account Data for Thousands of Vulnerable Families ATLANTA, GEORGIA — In a chilling reminder of...
A newly discovered malicious PAM module named “Plague” stealthily hijacks SSH logins, bypasses Linux authentication, and evades antivirus—threatening enterprise servers worldwide with root-level backdoors. It didn’t...
Security researchers urge immediate VPN shutdowns as Akira exploits SonicWall SSL VPN access in a sophisticated attack chain possibly involving zero-day exploits or credential compromise. BRUSSELS...
Hackers claim to have stolen terabytes of sensitive data from Dollar Tree; confusion arises as company links incident to 99 Cents Only Stores’ systems it acquired...
France’s largest telecom provider confirms internal system breach; customers warned of service disruptions as cybersecurity teams race to contain threat Paris — August 1, 2025In a...
A new Chrome security feature, Device Bound Session Credentials (DBSC), links session cookies to specific hardware, blocking malware-driven hijacks. Google’s transparency push via Project Zero further...
Minnesota’s capital city shuts down all IT systems after a “sophisticated, coordinated” cyberattack overwhelms local defenses. FBI, DHS, and National Guard step in. MAG212NEWS St. Paul,...
Silent Crow and Belarusian Cyber Partisans Say They Infiltrated Airline’s IT System for a Year Before Launching Disruptive Strike MOSCOW — July 28, 2025 — International...
Hackers Exploited Cloud Misconfiguration and API Weaknesses to Breach the Viral Red-Flag Dating App Used by Thousands of Women July 28, 2025 | MAG212NEWS In a...