Google’s Private AI Compute: The Cloud That Can’t See Your Data

Google has introduced a new system called Private AI Compute, a breakthrough in how artificial intelligence processes personal data. The aim is to combine the power of cloud computing with the privacy protection users expect from on-device processing. This means users can enjoy smarter, faster AI features without worrying about their private data being exposed. … Continued

Fantasy Hub: The Android Malware Service Turning Telegram into a Hacker Marketplace

A new Android malware called Fantasy Hub has been discovered by cybersecurity researchers. This malware is being sold as a full Malware-as-a-Service (MaaS) package on underground forums. It is designed to give hackers remote access to infected Android phones. The service is mainly promoted through Russian-speaking cybercrime channels. Fantasy Hub works like a remote access … Continued

The Code That Fights Back: GlassWorm’s Comeback in VS Code Extensions

A dangerous new malware called GlassWorm has made a return, targeting developers through Visual Studio Code (VS Code) extensions. This self-spreading worm is capable of infecting legitimate extensions, stealing developer credentials, and even taking remote control of systems. The campaign was first detected in October 2025 and, despite cleanup efforts, researchers have confirmed that new … Continued

Large-Scale ClickFix Phishing Campaign Targets Hotels with PureRAT Malware

A large-scale phishing campaign is targeting hotel systems across the world. Attackers are using a clever social engineering trick called “ClickFix” to fool hotel staff. This method convinces them to run harmful commands that secretly install malware. Security researchers have confirmed that this campaign is active and widespread. The attackers begin by sending fake emails … Continued

Google Introduces Dedicated Reporting Tool for “Review Extortion” on Business Profiles

Google has introduced a dedicated reporting tool for businesses to report review extortion on their profiles. Previously, businesses had to use the general tool for reporting inappropriate reviews, but the new tool specifically helps address situations where customers threaten to leave negative reviews unless they are paid or receive some form of compensation. What’s happening? … Continued

Critical ChatGPT Bugs Could Let Hackers Steal Sensitive User Information

Cybersecurity researchers have discovered multiple vulnerabilities in ChatGPT that could allow hackers to steal private user data. These flaws were found in features that connect ChatGPT to other apps and services. Experts say the weaknesses expose how integrated AI systems can unintentionally leak sensitive information. The findings have raised serious concerns among privacy and security … Continued

SonicWall Investigates State-Linked Intrusion Exposing Cloud Backup Data

In September 2025, cybersecurity company SonicWall discovered a serious breach involving its cloud backup service, MySonicWall. The company found that hackers had gained unauthorized access to backup files containing customers’ firewall configurations and settings. These files were stored in SonicWall’s cloud servers and were meant to help users easily restore their network setups if needed. … Continued

U.S. Sanctions 10 North Korean Entities for Laundering $12.7 Million Through Crypto and IT Fraud

The United States government has announced new sanctions against ten North Korean individuals and companies accused of laundering about $12.7 million through cryptocurrency and fraudulent IT-worker schemes. According to the U.S. Department of the Treasury, these funds came from cyber thefts and online fraud operations connected to North Korea’s state-controlled financial networks. In this action, … Continued

Operation SkyCloak: Tor-Enabled OpenSSH Backdoor Targets Global Defense Networks

A new cyber espionage campaign known as Operation SkyCloak is targeting military and defense organizations in Russia and Belarus. Security researchers have discovered that the attackers are using phishing emails with fake military documents to deliver malicious files. The campaign appears to be focused on stealing sensitive information and maintaining long-term access to defense systems. … Continued

Newsletter line