February 4, 2026

Operation Switch Off Targets Industrial-Scale Pirate TV Services

Operation Switch Off marks one of the most coordinated international crackdowns on illegal TV and sports streaming in recent years. Law enforcement agencies across multiple countries worked together to dismantle large-scale pirate IPTV services that reached millions of users worldwide. The operation highlights how digital piracy has evolved into a highly organized, cross-border industry with professional infrastructure and significant financial

Operation Switch Off
February 3, 2026

Ex-Google Engineer Convicted in AI Trade Secrets Theft Case

A U.S. federal jury has convicted a former Google engineer for stealing confidential artificial intelligence technology and transferring it to parties connected to China. The case marks one of the most significant prosecutions to date involving AI infrastructure and highlights how sensitive machine learning systems have become a matter of national concern. Prosecutors argued that the engineer abused his access

AI Trade Secrets Theft
February 2, 2026

Cloud Storage Payment Scam Floods Inboxes With Fake Renewals

Inbox phishing has entered a new phase as a widespread cloud storage payment scam targets users with urgent fake renewal notices. The messages claim storage plans have expired or payments failed, warning that files could soon be deleted. By exploiting fear around lost photos, backups, and documents, attackers pressure recipients into acting quickly and without verification. The campaign stands out

Cloud Storage Payment Scam
January 30, 2026

Nike Investigates Data Breach Linked To Extortion Group

Nike has launched a data breach investigation after an extortion group leaked internal company files online. The incident came to light when attackers published sample documents and claimed they had gained access to sensitive internal systems. Nike has confirmed it is assessing the situation, although it has not verified the attackers’ claims or the full scope of the alleged breach.

Nike data breach
January 29, 2026

Mustang Panda Infostealers Expand CoolClient Backdoor

Mustang Panda infostealers are now playing a central role in the Chinese-linked threat actor’s espionage campaigns, marking a clear shift in how the group extracts value from compromised systems. Recent research shows that the CoolClient backdoor has evolved beyond basic remote access and now includes dedicated data-stealing capabilities. This development raises the risk profile of CoolClient infections, especially for government

Mustang Panda
January 28, 2026

VoidLink Cloud Malware and the Rise of AI-Built Threats

The discovery of VoidLink cloud malware offers a rare and uncomfortable look at how artificial intelligence is beginning to reshape advanced cybercrime. The framework stands out not simply because it targets Linux or cloud environments, but because researchers uncovered strong evidence that AI played a central role in its planning and construction. Security analysts believe a single developer used AI-assisted

VoidLink cloud malware
January 27, 2026

ACF Plugin Vulnerability Allows Admin Access Without Login

A newly disclosed ACF plugin vulnerability has exposed more than 50,000 WordPress sites to potential administrative takeover. The flaw affects a widely used extension designed to enhance Advanced Custom Fields workflows, especially on sites that rely on frontend forms for user registration and profile management. Because these forms often remain publicly accessible, the vulnerability creates a direct path to full

ACF plugin vulnerability
January 26, 2026

ChatGPT Temporary Chat Gets a Long-Overdue Upgrade

ChatGPT Temporary Chat is receiving a long-overdue upgrade aimed at fixing one of its biggest weaknesses: unclear communication. While the feature has always promised privacy by keeping conversations out of chat history, many users remained unsure about what actually happened to their data. Subtle interface cues and easy-to-miss labels made it difficult to tell temporary chats apart from regular ones.

ChatGPT Temporary Chat
January 23, 2026

Zendesk Spam Abuse Targets Global Support Systems

Zendesk spam abuse has triggered a massive global email wave, flooding inboxes with unsolicited messages sent through legitimate customer support systems. The campaign does not rely on malware or phishing links. Instead, it exploits how many companies configure their Zendesk ticket submission workflows, allowing attackers to weaponize trusted infrastructure at scale. The result has been widespread disruption. Victims report receiving

Zendesk spam abuse
January 22, 2026

FortiGate Firewall Breach Exposes Network Configurations

A recent FortiGate firewall breach has highlighted how exposed perimeter infrastructure can create serious and lasting security risks. Attackers gained unauthorized access to FortiGate devices by reaching management interfaces that were accessible from the internet. This allowed them to export full configuration files without deploying malware or exploiting a software flaw. The incident shows how operational exposure alone can undermine

FortiGate firewall breach