662,752 User Records Leaked on Cybercrime Forum
Three days before Substack told users about a security incident, a very different version of the story was already circulating in underground cyber crime forums.…
Three days before Substack told users about a security incident, a very different version of the story was already circulating in underground cyber crime forums.…
Spain’s Ministry of Science (Ministerio de Ciencia) announced a partial shutdown of its IT systems, affecting several citizen- and company-facing services. Ministerio de Ciencia, Innovación…
Hacker claims theft of data from 700,000 Substack users; Company confirms breach Pierluigi Paganini February 05, 2026 Substack confirmed a data breach after a hacker…
Listen to the article 3 min This audio is auto-generated. Please let us know if you have feedback. The Cybersecurity and Infrastructure Security Agency is…
Ransomware operators are hosting and delivering malicious payloads at scale by abusing virtual machines (VMs) provisioned by ISPsystem, a legitimate virtual infrastructure management provider. Researchers at…
The face-recognition app Mobile Fortify, now used by United States immigration agents in towns and cities across the US, is not designed to reliably identify…
Bunnings has been partially successful in setting aside a decision by the nation’s privacy watchdog that its use of facial recognition technology (FRT) in its…
With a SpaceX IPO expected this year, the company has plans for its revenue-generating Starlink business that could expand its reach into new markets, including…
Viral social network “Moltbook” built entirely by artificial intelligence leaked authentication tokens, private messages and user emails through missing security controls in production environment. Wiz…
Telstra says it will face “tough trade-offs” between containing costs and investing in mobile infrastructure if it’s forced to pay to fill regional service coverage…
A Cybersecurity and Infrastructure Security Agency order published Thursday directs federal agencies to stop using “edge devices” like firewalls and routers that their manufacturers no…
Ravie LakshmananFeb 05, 2026Botnet / Network Security The distributed denial-of-service (DDoS) botnet known as AISURU/Kimwolf has been attributed to a record-setting attack that peaked at…