Cybersecurity News
Stay informed about the latest cybersecurity incidents, vulnerabilities, and threat landscape changes. We cover data breaches, ransomware campaigns, critical CVEs, and regulatory updates – with context on what it means for you and how to protect yourself.
Classic Outlook for Windows Crashes at Launch: Microsoft Probes Exchange Online Authentication Concurrency Limit
Microsoft is investigating an incident that causes the classic Outlook for Windows client to crash at startup for some Microsoft ...
Google’s Developer Verification Rule Will Gate Sideloaded Apps on Certified Android Devices
Google will require that, starting in 2026, certified Android devices (phones and tablets with Google Mobile Services and Play Protect) ...
CometJacking: Prompt Injection in Perplexity Comet Lets Attackers Pull Data from Connected Accounts
Security researchers at LayerX have documented a technique they call CometJacking, where attackers embed malicious instructions in URL parameters to ...
Medusa Ransomware Tries to Recruit BBC Insider, Leverages MFA Bombing
Operators linked to the Medusa ransomware operation allegedly attempted to recruit a BBC employee for insider access, offering a substantial ...
Akira Ransomware Is Breaching SonicWall SSL VPN Even With MFA: What We Know and How to Respond
Arctic Wolf is tracking an evolution in the Akira ransomware campaign against SonicWall SSL VPN in which attackers successfully authenticate ...
Afghanistan’s Nationwide Internet Blackout on 29 September 2025: What Happened and What Comes Next
Afghanistan experienced a nationwide internet blackout on 29 September 2025, confirmed by monitoring platforms NetBlocks and Cloudflare Radar. The disruption ...
Georgia Tech finds privacy vulnerabilities in Tile Bluetooth trackers
Researchers from the Georgia Institute of Technology have disclosed multiple privacy weaknesses in Tile Bluetooth trackers that could enable long-term ...
Google’s AI boosts Drive for desktop with ransomware detection, sync pause, and guided recovery
Google has rolled out an AI-driven ransomware defense for Drive for desktop on Windows and macOS that detects behaviors typical ...
PyPI Revokes Compromised Tokens After GhostAction Attack, Urges Shift to Short-Lived Credentials
The Python Software Foundation (PSF) has invalidated all PyPI tokens compromised during the GhostAction supply chain campaign uncovered in early ...
Fake GitHub Repositories Push Atomic Stealer (AMOS) to macOS Users via SEO Poisoning
Threat actors are abusing search engine optimization (SEO) to seed fake GitHub repositories that impersonate well-known macOS software and redirect ...