Russian Telecom Operators Implement Selective Blocking of Voice Features in Foreign Messaging Apps

Water droplets on Telegram and WhatsApp logos against a dark background.

Russian users of popular messaging applications experienced widespread technical difficulties with voice and video calling functionality on August 11, 2024. The disruptions primarily affected Telegram and WhatsApp, indicating the potential implementation of selective blocking measures targeting international messaging platforms’ communication features. Telecom Industry Economic Pressures Drive Blocking Initiative Russia’s major telecommunications providers—MTS, MegaFon, Beeline, and … Read more

Kinsing Cryptojacking Group Targets Russian Enterprises in Major Campaign Shift

A focused man at a computer, monitoring cybersecurity alerts in a modern office.

A significant shift in cybercriminal targeting patterns has emerged as the notorious Kinsing cryptojacking group launches unprecedented attacks against Russian enterprises across multiple sectors. The threat actors, previously focused on Western targets, have expanded their operations to compromise corporate systems for unauthorized cryptocurrency mining, marking a dangerous evolution in their attack methodology. Strategic Pivot: From … Read more

Google Awards Record $250,000 Bug Bounty for Critical Chrome Sandbox Escape Vulnerability

Man holding a large Google check for $250,000 in an office setting.

Google has established a new milestone in cybersecurity research by awarding a security researcher known as “Micky” a record-breaking $250,000 bug bounty for discovering a critical vulnerability in Chrome browser. This payment represents the maximum possible reward for sandbox escape vulnerabilities, highlighting the severity and sophistication of the security flaw discovered. Understanding CVE-2025-4609: A Complex … Read more

PXA Stealer Malware Campaign Compromises 4,000 Victims Across 62 Countries in 2024

Hooded figure typing on a laptop, with a skull looming above and a cracked desert background.

Cybersecurity researchers from Beazley Security and SentinelOne have uncovered a sophisticated malware campaign involving the upgraded PXA Stealer information-stealing trojan. This Python-based malware has successfully compromised over 4,000 victims across 62 countries, highlighting the growing threat of advanced infostealer operations targeting global users. Global Impact and Attack Statistics The scale of the PXA Stealer campaign … Read more

Google Search Vulnerability Exploited to Remove Content from Search Results

Large crowd gathers outside a prominent Google building in a cityscape.

Cybersecurity researchers from the Freedom of the Press Foundation have uncovered a critical vulnerability in Google’s search infrastructure that enabled malicious actors to systematically remove web pages from search results. The security flaw was exploited through Google’s legitimate Refresh Outdated Content tool, designed to help users update search results by removing outdated information. Technical Analysis … Read more

AI-Generated Malware Discovered in NPM Repository: First Cryptocurrency Stealer Created by Artificial Intelligence

Two contrasting screens: safe patch manager and hacker stealing digital assets.

Cybersecurity researchers have documented the first confirmed case of AI-generated malware infiltrating the official NPM repository. The malicious package @kodane/patch-manager represents a watershed moment in cybersecurity, demonstrating how threat actors are leveraging artificial intelligence to create sophisticated cryptocurrency stealing malware with unprecedented efficiency. Malicious Package Details and Distribution Scale The compromised package masqueraded as legitimate … Read more

Critical Vulnerabilities Discovered in Cursor AI Code Editor: MCPoison and CurXecute Exploits Threaten Developer Security

Silhouette of a hooded figure against a glowing red billboard in a stormy urban setting.

Cybersecurity researchers have uncovered multiple critical vulnerabilities in Cursor AI, a widely-used artificial intelligence-powered code editor, that could allow attackers to execute arbitrary code on developer systems without user knowledge. These security flaws, centered around the Model Context Protocol (MCP), represent a new class of threats targeting AI-enhanced development tools and highlight significant risks in … Read more

Advanced Linux Malware “Plague” Bypasses Security Systems Using Modified PAM Authentication

Aerial view of a cityscape featuring the Space Needle and buildings with 'SSH' on a rooftop.

Cybersecurity researchers from Nextron Systems have uncovered a sophisticated Linux malware campaign that remained undetected for over twelve months. The malicious software, dubbed “Plague,” represents a new generation of persistent threats targeting Linux infrastructure through compromised SSH connections and modified authentication modules. PAM Module Manipulation Creates Persistent Backdoor Access Plague operates by infiltrating the Linux … Read more

Google Confirms Salesforce CRM Breach by ShinyHunters Cybercriminal Group

Businessman in stress with Google and Salesforce logos, and a skull nearby.

Google has officially confirmed a significant security incident involving the compromise of its corporate Salesforce CRM instance by the notorious ShinyHunters cybercriminal group. The breach, which occurred in June 2025, represents part of a broader campaign targeting organizations utilizing the popular customer relationship management platform. Attack Details and Compromised Data According to Google’s official statement, … Read more

Anthropic Blocks OpenAI’s Claude API Access Following Terms of Service Violations

Close-up of a card with "Claude API Key" text and water droplets.

Anthropic has imposed restrictions on OpenAI’s access to its Claude API following confirmed violations of the service’s terms of use. According to a comprehensive investigation by Wired, OpenAI engineers extensively utilized Claude’s capabilities during the development and testing phases of their upcoming GPT-5 model, directly contravening the licensing agreement between the two AI companies. Understanding … Read more