Google Disrupts IPIDEA, One of the World’s Largest Residential Proxy Networks

Google has announced a major cybersecurity operation against IPIDEA, one of the world’s largest residential proxy networks. The action was carried out by Google’s Threat Intelligence Group to stop widespread abuse of consumer internet connections. According to Google, the network was being heavily misused by cybercriminals. The disruption is aimed at protecting everyday users and … Continued

Fortinet Patches CVE-2026-24858 Following Active Exploitation of FortiOS SSO

Fortinet has released emergency security updates after confirming active exploitation of a serious vulnerability in its FortiOS Single Sign-On system. The flaw, tracked as CVE-2026-24858, allows attackers to bypass authentication controls. Security researchers found that the issue was already being abused in real-world attacks. This made immediate patching critical. The vulnerability affects how Fortinet devices … Continued

Vibe-Coded Sicarii Ransomware Leaves Victims With No Way to Decrypt Data

A newly identified ransomware strain called Sicarii has raised serious concern in the cybersecurity world. Security researchers have confirmed that files encrypted by this ransomware cannot be decrypted, even if victims pay the ransom. This makes Sicarii different from many traditional ransomware attacks. Once the damage is done, the data is effectively locked forever. Ransomware … Continued

Nike Investigates After Ransomware Group Claims Massive Data Leak

Nike is investigating a potential cybersecurity incident after a ransomware group known as World Leaks claimed it leaked a large volume of the company’s internal data. The group alleges that around 1.4 terabytes of Nike data has been published online. Nike has acknowledged the situation and confirmed that it is actively reviewing the claim. However, … Continued

Microsoft Releases Emergency Patch for Actively Exploited Office Zero-Day

Microsoft has released an emergency security update to fix a serious zero-day vulnerability in Microsoft Office that was already being exploited by attackers. The flaw, tracked as CVE-2026-21509, was considered dangerous enough to require an out-of-band patch, released outside Microsoft’s regular monthly update cycle. The company confirmed that real-world attacks were observed before the fix … Continued

Winning Against AI-Based Attacks Requires a Combined Defensive Approach

Cybersecurity experts say cyber attacks are becoming more advanced because attackers are now using artificial intelligence. AI allows hackers to create phishing emails, malicious scripts, and attack methods faster and at a much larger scale. These AI-driven attacks can quickly change their behaviour, making them difficult to detect. This shift has created serious challenges for … Continued

Konni Hackers Use AI-Generated PowerShell Backdoor to Target Blockchain Developers

A North Korea–linked hacking group known as Konni has been identified in a new cyber-espionage campaign targeting blockchain and cryptocurrency developers. Security researchers confirmed that the group is using an advanced PowerShell backdoor that appears to be generated with the help of artificial intelligence. The campaign mainly focuses on developers working on crypto platforms and … Continued

Newsletter line