May 16, 2025

Steam Data Leaked Online – No Cause for Panic, Valve Says

A new cybersecurity scare rippled through the gaming community this week. Allegedly, Steam data leaked online with reports speculating that data from 89 million Steam accounts has been breached. However, Valve, the company behind the world’s largest PC gaming platform, has responded swiftly, stating that no breach occurred and user accounts remain secure. What Happened? On May 15, 2025, reports

Steam data leaked
May 15, 2025

Chrome Vulnerability Leaks Cross-Origin Data

Google has released an urgent security update for Chrome to patch a newly discovered zero-day vulnerability, tracked as CVE-2025-4664, that is currently being exploited by attackers in the wild. This high-severity flaw affects how Chrome handles cross-origin requests and could allow attackers to leak sensitive information from users simply by luring them to a malicious web page. What Is CVE-2025-4664?

Chrome Vulnerability Leaks Cross-Origin Data
May 15, 2025

CPU-Level Ransomware: Is It Possible and How Dangerous Is It?

Ransomware has officially leveled up. In a chilling new development, cybersecurity researchers have unveiled the world’s first proof-of-concept CPU-level ransomware - an attack so deeply embedded in hardware that it bypasses every traditional defense in the cybersecurity playbook. Unlike conventional ransomware that encrypts files through software-level exploits, this innovation taps directly into the processor’s microcode, rewriting the rules of engagement.

CPU-Level Ransomware
May 14, 2025

LockBit Ransomware Hacked: What We Know So Far

In a major blow to one of the world’s most active ransomware groups, LockBit has been hacked, and the fallout could reshape the cybercrime landscape. On May 7, 2025, an unknown hacker gained access to LockBit’s administration panel, defaced its dark web site with the message “Don’t do crime, crime is bad xoxo from Prague,” and leaked a trove of

LockBit Ransomware Group Hacked
May 14, 2025

How to Spot Deepfakes – Don’t Fall in the Trap

Learning how to spot deepfakes and, more importantly, protect yourself is crucial, given the development of AI in the present. AI-generated content is no longer science fiction. Deepfakes (videos, images, or audio clips manipulated using artificial intelligence) are becoming increasingly convincing and, in many cases, dangerous. Whether it’s a politician delivering a speech they never gave or a loved one’s

how to spot deepfakes
May 13, 2025

DoppelPaymer Ransomware Suspect Arrested in Moldova

DoppelPaymer Ransomware suspect was arrested. In a significant blow to the global ransomware ecosystem, Moldovan authorities have seized a 45-year-old foreign national. He is suspected of playing a central role in the notorious DoppelPaymer ransomware attacks. The arrest, carried out on May 6, 2025, follows a coordinated operation with Dutch law enforcement and is part of a broader international effort

DoppelPaymer Ransomware Suspect Arrested
May 13, 2025

LegoGPT Turns Your Imagination Into Real LEGO Creations

Ever dreamed of building a LEGO castle, spaceship, or coffee table just by saying it out loud? Thanks to LegoGPT, that dream is now one step closer to your living room floor. Developed by researchers at Carnegie Mellon University, LegoGPT is a new AI tool that transforms simple text descriptions into realistic, buildable LEGO structures. No engineering degree or brick-counting

LegoGPT
May 12, 2025

Hackers Hiding Malware in JPEG in a New Wave of Attacks

In today’s cybersecurity landscape, even the most ordinary-looking files can be vehicles for sophisticated attacks. Recent findings have exposed a new method used by cybercriminals - hackers hiding malware in JPEG files to bypass security systems. This technique, known as steganography, allows attackers to hide harmful scripts inside files that appear completely harmless, turning images into a serious cybersecurity threat.

Hackers Hiding Malware in JPEG
May 12, 2025

Fake AI Apps: Cybercriminals Trick Users and Spread Malware

As AI tools skyrocket in popularity, they’re attracting more than just curious users and developers. Cybercriminals are seizing the moment, creating fake AI apps that promise powerful capabilities. They instead deliver something far more sinister: malware. Disguised as legitimate AI-powered platforms, these deceptive tools are being promoted through social media, especially Facebook, and are tricking thousands of users into downloading

Fake AI Apps Spread Malware
May 9, 2025

Gemini Nano Will Combat Online Scams, Google Promises

As online scams grow more sophisticated, Google is stepping up its game by embedding artificial intelligence directly into users' devices. The tech giant is now leveraging its Gemini Nano AI model. It's detects and blocks scams in real-time, all while keeping user data private by processing it locally. This marks a major shift in how tech companies are approaching cybersecurity,

Gemini Nano to Fight Online Scams