News
Russians Caught Stealing Ukrainian Data With i Phone Spyware
4+ week, 1+ day ago (514+ words) findarticles. com Cybersecurity teams have uncovered a Russia-aligned operation using advanced i Phone hacking tools to plunder personal data from Ukrainians, in a campaign that blended nation-state tradecraft with smash-and-grab theft. Researchers at Google, i Verify, and Lookout say the…...
Law Enforcement Dismantles Massive Router Botnet
1+ mon, 3+ day ago (619+ words) Gregory Zuckerman is a veteran investigative journalist and financial writer with decades of experience covering global markets, investment strategies, and the business personalities shaping them. His writing blends deep reporting with narrative storytelling to uncover the hidden forces behind financial…...
Pro'Iran Hacktivists Claim Responsibility for Stryker Breach
1+ mon, 4+ day ago (422+ words) Handala framed the operation as retaliation tied to recent regional conflict, a common hallmark of ideologically driven cyber campaigns. The group's statement also included sweeping claims about the scope of the breach. Those assertions have not been independently verified, and…...
US Contractor Built i Phone Hacks Used By Russian Spies
1+ mon, 5+ day ago (546+ words) findarticles. com A sophisticated i Phone exploitation suite originally developed by a U. S. military contractor is likely the source of hacking tools later deployed by Russian intelligence operatives against targets in Ukraine, according to new analyses by Google's security teams and…...
Google Says 48% Of 2025 Zero Days Hit Enterprises
1+ mon, 1+ week ago (585+ words) Gregory Zuckerman is a veteran investigative journalist and financial writer with decades of experience covering global markets, investment strategies, and the business personalities shaping them. His writing blends deep reporting with narrative storytelling to uncover the hidden forces behind financial…...
Government i Phone Hacking Tools Now Used By Criminals
1+ mon, 1+ week ago (440+ words) Investigators say Coruna began as a surveillance vendor's weapon for government customers. Over time, it migrated from targeted espionage to wider criminal use " a pipeline experts warn is becoming a recurring pattern as "secondhand" exploit markets mature. i Verify says…...
Hacked Traffic Cameras And Hijacked TVs Fuel Iran War
1+ mon, 1+ week ago (590+ words) findarticles. com Cyber operations moved from supporting cast to center stage as U. S. and Israeli forces opened a lethal campaign against Iran, with reports of hacked traffic cameras, hijacked state TV, and disrupted military networks shaping the first blows. Officials claim…...
U. S. Contractor Sentenced Over Hacking Tools Leak to Russia
1+ mon, 2+ week ago (567+ words) Justice Department filings describe the breach as a profound betrayal that potentially exposed "millions of computers and devices" to compromise. Williams received an 87-month sentence after pleading guilty, with court documents citing $1. 3 million in payments and a $35 million loss estimate…...
Bumble Sued Over Alleged Failure To Protect User Data
1+ mon, 2+ week ago (357+ words) Bumble is facing a proposed class action from a Texas user who alleges the dating app failed to safeguard highly sensitive personal information during a recent breach linked to the hacker collective Shiny Hunters. The complaint argues the company did…...
Hackers Claim Access To Tinder And Hinge Data
2+ mon, 2+ week ago (614+ words) Gregory Zuckerman is a veteran investigative journalist and financial writer with decades of experience covering global markets, investment strategies, and the business personalities shaping them. His writing blends deep reporting with narrative storytelling to uncover the hidden forces behind financial…...