Tag: hacking
-
Italy moves to extradite Chinese national to the U.S. over hacking charges
Italy plans to extradite Xu Zewei to the U.S. over alleged hacks on COVID-19 research tied to state-backed operations. Italy is moving to extradite Xu Zewei, the Chinese national arrested in 2025 at the request of U.S. authorities on cyber-espionage charges, Bloomberg reported. The case stands out because it ties a single suspect, Xu, to…
-
New BlackFile extortion group linked to surge of vishing attacks
A new financially motivated hacking group tracked as BlackFile has been linked to a wave of data theft and extortion attacks against retail and hospitality organizations since February 2026. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/new-blackfile-extortion-gang-targets-retail-and-hospitality-orgs/
-
Hacking Safari with GPT 5.4
When Anthropic unveiled Mythos and Project Glasswing, the reaction was immediate and polarized. Some dismissed it as fear-driven marketing, while others treated it as a credible shift in the threat landscape. Like with many things, the truth is probably somewhere in the middle. I wanted to test that for myself, and since I recently got……
-
Breach Roundup: Myanmar Scam Compound Managers Charged
Also, Europol Cracks DDoS Networks, Mythos Finds Bugs, France Portal Hit. This week, scam compounds. Attackers exploit flaws pre-disclosure. A crackdown on DDoS-for-hire. No Mythos for CISA, yes for Mozilla. France ID portal breach. Israeli and Venezuelan critical infrastructure targeted. Russian hacking in Ukraine. An Apache flaw. A ransomware negotiator aided BlackCat. First seen on…
-
Hacked Devices Are Gateways for Chinese Nation-State Hackers
Routing Malicious Traffic Through Hacked IoT Devices Is Leading to ‘IoC Extinction’. Networks comprised of hacked domestic devices underpin a mounting number of Chinese nation-state hacking operations, warned British, U.S. and a slew of other national cybersecurity agencies. The networks comprise small office home office routers, IoT equipment and smart devices. First seen on govinfosecurity.com…
-
Chinese hackers using compromised networks to spy on Western companies, says Five Eyes
Companies urged to take countermeasures as Chinese hacking groups use networks of infected home and office devices ‘at scale’ to evade security monitoring systems First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366641986/Chinese-hackers-using-compromised-networks-to-spy-on-Western-companies-says-Five-Eyes
-
CyberUK 2026: UK lagging on legal protections for cyber pros
Ahead of next week’s CyberUK conference, the CyberUp Campaign for reform of the UK’s hacking laws urges the government to keep focus and proposes a four-pillar framework that would protect cyber professionals from prosecution First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366641875/CYBERUK-26-UK-lagging-on-legal-protections-for-cyber-pros
-
Chinese hackers using everyday devices to target UK firms, warns cybersecurity agency
Britain’s National Cyber Security Centre says companies must step up vigilance to prevent espionage attacks<ul><li><a href=”https://www.theguardian.com/business/live/2026/apr/23/uk-government-borrowing–oil-100-a-barrel-strait-of-hormuz-deadlock-growth-latest-updates”>Business live latest updates</li></ul>British businesses are being urged to step up their vigilance against a China-linked hacking ploy that uses everyday devices for espionage.The UK’s National Cyber Security Centre (NCSC) and agencies in nine other countries have warned of persistent…
-
Chinese hackers are using everyday devices to hack UK firms, warns watchdog
Britain’s cybersecurity agency says companies must step up vigilance to prevent espionage attacks<ul><li><a href=”https://www.theguardian.com/business/live/2026/apr/23/uk-government-borrowing–oil-100-a-barrel-strait-of-hormuz-deadlock-growth-latest-updates”>Business live latest updates</li></ul>British businesses are being urged to step up their vigilance against a China-linked hacking ploy that uses everyday devices for espionage.The UK’s National Cyber Security Centre (NCSC) and agencies in nine other countries have warned of persistent attempts by…
-
Chinese hackers are using everyday devices to hack UK firms, warns watchdog
Britain’s cybersecurity agency says companies must step up vigilance to prevent espionage attacks<ul><li><a href=”https://www.theguardian.com/business/live/2026/apr/23/uk-government-borrowing–oil-100-a-barrel-strait-of-hormuz-deadlock-growth-latest-updates”>Business live latest updates</li></ul>British businesses are being urged to step up their vigilance against a China-linked hacking ploy that uses everyday devices for espionage.The UK’s National Cyber Security Centre (NCSC) and agencies in nine other countries have warned of persistent attempts by…
-
Russian Hacking Reaches New Levels of Hostility
Nation-State Hits Now Comprise Majority of Serious Incidents Probed by Government. British intelligence officials said they investigate about four major incidents per week, with the majority involving nation-state actors. Officials said the shape and scope of how cyberattacks are being wielded by the nation’s adversaries continues to change as fast as the technology evolves. First…
-
Russians Hacking Reaches New Levels of Hostility
Nation-State Hits Now Comprise Majority of Serious Incidents Probed by Government. British intelligence officials said they investigate about four major incidents per week, with the majority involving nation-state actors. Officials said the shape and scope of how cyberattacks are being wielded by the nation’s adversaries continues to change as fast as the technology involves. First…
-
Scattered Spider hacker pleads guilty to stealing $8 million in cryptocurrency
A British national tied to the Scattered Spider cybercrime group pleaded guilty to hacking multiple companies via SMS phishing and stealing over $8 million in virtual currency … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/04/21/british-national-scattered-spider-guilty-sms-phishing/
-
The thin gray line: Handala, CyberAv3ngers and Iran’s proxy ops
A state of perpetual interference: To understand how proxy insurgent groups such as Handala fit within Iran’s modern-day intelligence ecosystem, we first need to look at the historical development of the country’s intelligence operations.In 1953, the United States and Britain (via conduit operations of the CIA and MI6, respectively) instigated a coup in Iran that…
-
Scattered Spider member Tyler Buchanan pleads guilty to major crypto theft
Tyler Buchanan, linked to Scattered Spider, pleaded guilty in the US to hacking companies and stealing millions in cryptocurrency. Tyler Buchanan, a 24-year-old from Scotland linked to the Scattered Spider group, admitted in a US court that he hacked dozens of companies, committed fraud, and stole millions in cryptocurrency. Spanish police arrested the British national…
-
Scattered Spider member Tyler Buchanan pleads guilty to major crypto theft
Tyler Buchanan, linked to Scattered Spider, pleaded guilty in the US to hacking companies and stealing millions in cryptocurrency. Tyler Buchanan, a 24-year-old from Scotland linked to the Scattered Spider group, admitted in a US court that he hacked dozens of companies, committed fraud, and stole millions in cryptocurrency. Spanish police arrested the British national…
-
British Hacker Tyler Buchanan Pleads Guilty to $8M Hacking Scheme in US
Tyler Robert Buchanan, a 24-year-old British hacker linked to Scattered Spider, admits to a multi-year US hacking scheme involving at least $8M in crypto theft. First seen on hackread.com Jump to article: hackread.com/british-hacker-tyler-buchanan-guilty-hacking-scheme/
-
A History of Global Hacking, and Where It’s Going Next
In her new book, Code War: How Nations Hack, Spy, and Shape the Digital Battlefield, Allie Mellen provides true stories of the current cyber war and, importantly, what might be ahead. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/04/a-history-of-global-hacking-and-where-its-going-next/
-
US-sanctioned currency exchange says $15 million heist done by unfriendly states
Tags: hackingGrinex says needed hacking resources “available exclusively to … unfriendly states.” First seen on arstechnica.com Jump to article: arstechnica.com/security/2026/04/russia-friendly-exchange-says-western-special-service-behind-15-million-cyberattack/
-
7 biggest healthcare security threats
Tags: access, ai, api, attack, breach, business, cloud, control, credentials, cyber, cyberattack, cybersecurity, dark-web, data, data-breach, email, endpoint, google, government, hacking, healthcare, HIPAA, infrastructure, injection, insurance, Internet, phishing, risk, security-incident, service, software, spam, sql, threat, tool, vulnerabilityCloud vulnerabilities and misconfigurations: Many healthcare organizations have adopted cloud services as part of broader digital transformation initiatives. As a result, patient health information (PHI) and other sensitive data is increasingly being hosted in vendor cloud environments.The trend has broadened attack surface at healthcare organizations, says Anthony James, vice president of products at Infoblox, especially…
-
7 biggest healthcare security threats
Tags: access, ai, api, attack, breach, business, cloud, control, credentials, cyber, cyberattack, cybersecurity, dark-web, data, data-breach, email, endpoint, google, government, hacking, healthcare, HIPAA, infrastructure, injection, insurance, Internet, phishing, risk, security-incident, service, software, spam, sql, threat, tool, vulnerabilityCloud vulnerabilities and misconfigurations: Many healthcare organizations have adopted cloud services as part of broader digital transformation initiatives. As a result, patient health information (PHI) and other sensitive data is increasingly being hosted in vendor cloud environments.The trend has broadened attack surface at healthcare organizations, says Anthony James, vice president of products at Infoblox, especially…
-
Smashing Security podcast #463: This AI company leaked its own code. It’s also built something terrifying
A hacking group claims to have broken into the flood defence system protecting Venice’s Piazza San Marco – and is offering to sell access to whoever wants it. The asking price? A frankly insulting $600. First seen on grahamcluley.com Jump to article: grahamcluley.com/smashing-security-podcast-463/
-
CYBERUK ’26: UK lagging on legal protections for cyber pros
Ahead of next week’s CYBERUK conference, the CyberUp Campaign for reform of the UK’s hacking laws urges the government to keep focus, and proposes a four-pillar framework that would protect cyber professionals from prosecution. First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366641875/CYBERUK-26-UK-lagging-on-legal-protections-for-cyber-pros
-
Microsoft pays $2.3M for cloud and AI flaws at Zero Day Quest
Microsoft has awarded $2.3 million to security researchers after receiving nearly 700 submissions during this year’s Zero Day Quest hacking contest. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/microsoft/microsoft-pays-23-million-for-cloud-and-ai-flaws-at-zero-day-quest/
-
Adobe fixes PDF zero-day security bug that hackers have exploited for months
It’s not clear how many people were compromised by this hacking campaign, but a security researcher said the hackers were targeting victims since at least November 2025. First seen on techcrunch.com Jump to article: techcrunch.com/2026/04/14/adobe-fixes-pdf-zero-day-security-bug-that-hackers-have-exploited-for-months/
-
Here’s how cyber heavyweights in the US and UK are dealing with Claude Mythos
Two reports from former high-level U.S. cyber officials and the UK government’s top AI research institution reveal how top defenders think about the tool’s hacking capabilities. First seen on cyberscoop.com Jump to article: cyberscoop.com/claude-mythos-ai-cybersecurity-threat-report/
-
‘Grand Theft Auto’ publisher Rockstar hit by hackers again
The notorious ShinyHunters hacking collective menaces video game publisher Rockstar and says it will leak data on 14 April First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366641486/Grand-Theft-Auto-publisher-Rockstar-hit-by-hackers-again

