BadCam BadUSB Attack Turns Linux Webcams Into Threats
The newly discovered BadCam BadUSB attack exposes a dangerous flaw in certain Linux-based webcams. Security researchers warn that the vulnerability could allow attackers to reprogram webcams into malicious USB devices, enabling persistent threats that survive even after system reinstallation. This finding has raised concerns over USB device trust and firmware security. How the BadCam Attack Works Security firm Eclypsium identified

Google Ads Data Breach Exposes Millions of Business Records
Google has confirmed a significant data breach involving information about potential Google Ads customers. The breach targeted one of the company’s Salesforce CRM instances, which is used to manage and track communication with prospective advertisers. According to Google, the attack took place in June 2025 and was carried out by the hacking group known as ShinyHunters, also referred to as

BlackSuit Ransomware Dismantled in a Global Operation
BlackSuit ransomware dismantled! That’s the headline echoing across cybersecurity circles after a sweeping international effort shut down one of the most prolific ransomware groups in recent years. The operation, called “Operation Checkmate,” was led by Homeland Security Investigations (HSI), with support from the FBI, Europol, and multiple global law enforcement partners. A Ruthless Successor to Royal BlackSuit first emerged in

GreedyBear Steals $1M in Crypto via Browser Extensions
A new cybercrime operation called GreedyBear has looted over $1 million in cryptocurrency through an elaborate scheme involving malicious browser extensions, cracked software, and deceptive crypto-themed websites. According to cybersecurity researchers at Lookout, this campaign represents one of the most coordinated and multifaceted threats targeting digital asset holders in recent months. Fake Wallet Extensions Flood Browser Stores GreedyBear's primary weapon

New EDR-Killer Tool Used by Eight Ransomware Gangs
A newly discovered EDR-killer tool is being actively deployed by at least eight different ransomware groups to disable antivirus and endpoint detection systems during attacks. The tool exploits a Bring Your Own Vulnerable Driver (BYOVD) method, allowing threat actors to neutralize even the most well-known security software. Shared but customized for each attack According to security researchers at Sophos, this

PBS Data Breach Exposes Employee Data on Discord Servers
The PBS data breach raises alarms. The personal information of nearly 4,000 employees was leaked on Discord servers frequented by fans of PBS Kids. The incident appears to stem from a breach of the organization's internal platform, MyPBS.org, and is now under investigation. What Was Leaked? The exposed file, shared publicly on Discord, contained sensitive information of 3,997 employees and

Pandora Data Breach Linked to Salesforce Attack Campaign
Jewelry giant Pandora has confirmed a data breach following a targeted attack on its Salesforce environment. The breach is part of a larger wave of cyberattacks orchestrated by cybercriminal groups exploiting misconfigured or vulnerable Salesforce customer accounts. Pandora disclosed the incident in customer notifications sent out on August 5, 2025. While the company emphasized that its core infrastructure was not

Cybercriminals and GenAI: How Hackers Are Weaponizing AI Tools
Cybercriminals and GenAI are forming a dangerous new alliance. AI tools are no longer just experimental, they’re fully integrated into modern cybercrime. From phishing to deepfakes, GenAI is giving hackers new capabilities that make attacks faster, smarter, and harder to detect. A new CrowdStrike report confirms what many in the security industry have feared: cybercriminals treat GenAI as a core

PlayPraetor Android Trojan Infects 11,000+ Devices via Fake Play Store Pages
The Android threat landscape has a dangerous new player. PlayPraetor is a highly sophisticated Remote Access Trojan (RAT) that has already compromised over 11,000 devices worldwide. Distributed through convincing fake Play Store pages, SMS phishing campaigns, and sponsored Meta ads, this malware is spreading rapidly, with over 2,000 new infections per week. A Look at the Distribution Tactics PlayPraetor isn’t

ShinyHunters Salesforce Breach Hits Qantas, Allianz Life, and LVMH
The hacking group ShinyHunters takes the spotlight again. This time tied to a wave of social engineering attacks that targeted Salesforce systems at major companies like Qantas, Allianz Life, and LVMH. The group exploited human trust, not software flaws, to access sensitive customer data across industries. Vishing Attacks Open the Door According to reports, attackers used vishing (voice phishing) to
