Logitech Options+ and G Hub Fail on macOS After Code Signing Certificate Expiration

Two users update software with a virtual assistant in a futuristic environment.

Owners of Apple devices recently faced a widespread issue: Logitech Options+ and Logitech G Hub suddenly stopped launching on macOS. Advanced configuration of mice, keyboards, and gaming peripherals became unavailable, and devices reverted to basic functionality. The root cause was the expiration of Logitech’s macOS code signing certificate, which was not renewed in time. What … Read more

Jaguar Land Rover Cyber Attack: Ransomware Shock to the UK Automotive Sector

Workers express concern over halted production and a ransomware attack in an auto factory.

The large-scale cyber attack on Jaguar Land Rover (JLR) in late 2025 has moved from being an isolated IT incident to a measurable macroeconomic event. Preliminary results for JLR’s third quarter of the 2026 financial year show a sharp decline in sales that the company explicitly links to the ransomware attack. How the Jaguar Land … Read more

Kimwolf Android Botnet Uses Open ADB and Residential Proxies to Hijack Millions of Devices

Cybersecurity operators monitor the Kimwolf botnet and global attacks in a futuristic setting.

The rapidly expanding Kimwolf Android botnet, a new branch of the Aisuru malware family, has become one of the most powerful networks of compromised devices in circulation. According to Synthient’s telemetry, Kimwolf already controls almost two million Android hosts and cycles through around 12 million unique IP addresses every week, giving operators immense leverage for … Read more

Ledger Customer Data Exposed via Global-e Breach: What Crypto Users Need to Know

Team addresses a global data breach with high-tech screens in a futuristic control room.

Manufacturer of hardware crypto wallets Ledger has confirmed a customer data leak originating not from its own infrastructure, but from a compromise of third‑party payment platform Global-e. The incident clearly illustrates how vulnerable modern supply chains in e-commerce are, and why a single compromised partner can create significant risk for cryptocurrency holders. Ledger data breach: … Read more

Telegram MTProto Proxy Vulnerability Exposes Users’ Real IP Addresses

Man using a smartphone with Telegram app in a dimly lit room.

Telegram users on Android and iOS can have their real IP address exposed simply by tapping a specially crafted link, according to recent security research. The attack abuses the way Telegram handles MTProto proxy configuration links and does not require any further confirmation or interaction from the victim. How Telegram MTProto Proxy Links Can Leak … Read more

ClickFix Booking.com Phishing Campaign Hits European Hotels with Fake BSOD and DCRAT Malware

Woman booking a hotel online, contrasting with a hacker in dark surroundings.

A new phishing campaign dubbed PHALT#BLYX is targeting hotels across Europe by impersonating Booking.com and abusing a technique known as a ClickFix attack. Instead of exploiting software vulnerabilities, the attackers trick hotel staff into manually running a pre‑prepared PowerShell command, ultimately deploying the DCRAT remote access trojan and additional payloads such as cryptocurrency miners. ClickFix … Read more

Bitfinex Hack Architect Ilya Lichtenstein Released Early: What the Case Teaches About Crypto Security

Urban waterfront view with geese and an ankle monitor in focus.

Ilya Lichtenstein, a central figure in one of the largest cryptocurrency criminal cases to date, has been released early from U.S. federal prison after his conviction for laundering funds stolen from the Bitfinex exchange in 2016. Although sentenced to five years, he reportedly served around 14 months in custody and is now under home confinement, … Read more

Apex Legends Security Incident: Anti-Cheat Exploit Lets Attackers Control Players

Futuristic battlefield scene with soldiers and a player interacting in a virtual setting.

At the end of last week, some Apex Legends players reported an unusual and highly visible security incident: attackers were able to remotely control in‑game characters in real time, forcibly disconnect users from matches, and even temporarily change teammate nicknames to “RSPN Admin”. The case has reignited discussion around how well protected modern online games … Read more

Windows 11 Adds New Group Policy to Remove Microsoft Copilot on Enterprise Devices

Microsoft headquarters overlook with two employees discussing a digital interface.

Microsoft is testing a new Windows 11 group policy that allows organizations to centrally remove the Microsoft Copilot app from managed endpoints. The feature, targeted at enterprise and education environments, strengthens administrative control over AI assistants and supports stricter cybersecurity and compliance requirements. New Windows 11 group policy to remove Microsoft Copilot The new setting, … Read more

BreachForums Data Leak Exposes Hacker Forum Users and Compromises PGP Key

Dark-themed workspace featuring a cracked screen with "BreachForums," an hourglass, and handcuffs.

A new chapter in the history of the underground hacker forum BreachForums has ended with an ironic twist: the forum’s own users have become victims of a data leak. An SQL dump of the platform’s user database, together with the administration’s private PGP key, has been published online. This significantly increases the risk of deanonymizing … Read more