Advantest Ransomware Attack Disrupts Chip Supply Chain
Advantest ransomware attack news has raised fresh concerns across the semiconductor sector after the Japanese technology giant confirmed a cyber intrusion into its corporate network. The company detected suspicious activity on February 15 and immediately activated its incident response protocols to contain the threat and protect critical systems. Advantest later confirmed that attackers gained unauthorized access and deployed ransomware on

PromptSpy Android Malware Uses Generative AI at Runtime
PromptSpy Android malware has introduced a new chapter in mobile cyber threats by integrating generative AI directly into its runtime operations. Security researchers recently identified it as the first known Android malware to actively communicate with a large language model while executing on an infected device. This shift moves AI from being a supporting tool for attackers into the core

Massiv Android Malware Spreads via Fake IPTV Apps
Massiv Android malware has emerged as a new banking threat targeting mobile users through fake IPTV applications. Attackers disguise the malware as a streaming app to trick users into installing it outside official app stores. Once active, it gives criminals deep access to infected devices and allows them to steal sensitive financial data. Security researchers observed the campaign primarily targeting

Copilot Email Bug Raises Enterprise Privacy Concerns
Enterprise AI tools promise efficiency, faster communication, and smarter workflows. At the same time, organizations expect these systems to respect strict security boundaries built into their environments. That balance came under scrutiny after Microsoft confirmed a Copilot email bug that allowed confidential Outlook messages to be summarized despite active Data Loss Prevention protections. Although no external breach occurred, the issue

AMOS Infostealer Exploits AI Trust to Target macOS Users
A growing malware campaign is targeting macOS users by abusing the popularity of artificial intelligence tools and online search results. The threat centers on AMOS, short for Atomic macOS Stealer, an infostealer designed to harvest sensitive data from Apple systems. Instead of relying on traditional phishing emails or software cracks, attackers are now embedding malware within seemingly helpful AI-related content

Malware in Coding Challenges Targets Developers Seeking Jobs
Cybercriminals are embedding malware in coding challenges and sending them to developers through fake recruitment campaigns. What looks like a standard technical interview task is, in reality, a carefully constructed infection chain designed to compromise machines and steal sensitive data. Security researchers say this campaign has operated for months and continues to evolve. Instead of relying on obvious phishing emails

LaLiga Piracy Ruling: Spain Orders VPN IP Blocking
Spain has intensified its crackdown on illegal football streaming through a new LaLiga piracy ruling that shifts enforcement beyond traditional internet service providers. A commercial court has ordered two major VPN companies to restrict access to IP addresses linked to unauthorized LaLiga broadcasts, marking a notable expansion in how copyright protection operates in the digital space. Instead of focusing solely

Malicious 7-Zip Installer Turns PCs Into Proxy Nodes
Cybercriminals are abusing trust in popular software to spread malware at scale. The malicious 7-Zip installer campaign shows how a simple download mistake can quietly turn a personal computer into part of a criminal proxy network. Instead of delivering only the legitimate compression tool, attackers bundled hidden components that operate in the background and grant remote operators control over internet

SmarterTools Breach Triggered by SmarterMail Flaw
The SmarterTools breach did not begin with phishing emails or stolen passwords. Instead, attackers entered the company’s network by exploiting a flaw in SmarterMail, the very product SmarterTools develops and maintains. The incident unfolded on January 29, 2026, when the Warlock ransomware group leveraged an authentication bypass vulnerability to gain control of an unpatched internal server. This breach serves as

Zendesk Spam Wave Returns With Fake Account Activation Emails
A renewed Zendesk spam wave is flooding inboxes worldwide with unsolicited “Activate your account” emails that appear to come from trusted companies. Many recipients never signed up for any service, yet the messages look authentic and often bypass spam filters. The scale and persistence of the campaign have raised concerns among security teams, especially as the emails originate from legitimate
