Operation Switch Off Targets Industrial-Scale Pirate TV Services
Operation Switch Off marks one of the most coordinated international crackdowns on illegal TV and sports streaming in recent years. Law enforcement agencies across multiple countries worked together to dismantle large-scale pirate IPTV services that reached millions of users worldwide. The operation highlights how digital piracy has evolved into a highly organized, cross-border industry with professional infrastructure and significant financial

Ex-Google Engineer Convicted in AI Trade Secrets Theft Case
A U.S. federal jury has convicted a former Google engineer for stealing confidential artificial intelligence technology and transferring it to parties connected to China. The case marks one of the most significant prosecutions to date involving AI infrastructure and highlights how sensitive machine learning systems have become a matter of national concern. Prosecutors argued that the engineer abused his access

Cloud Storage Payment Scam Floods Inboxes With Fake Renewals
Inbox phishing has entered a new phase as a widespread cloud storage payment scam targets users with urgent fake renewal notices. The messages claim storage plans have expired or payments failed, warning that files could soon be deleted. By exploiting fear around lost photos, backups, and documents, attackers pressure recipients into acting quickly and without verification. The campaign stands out

Nike Investigates Data Breach Linked To Extortion Group
Nike has launched a data breach investigation after an extortion group leaked internal company files online. The incident came to light when attackers published sample documents and claimed they had gained access to sensitive internal systems. Nike has confirmed it is assessing the situation, although it has not verified the attackers’ claims or the full scope of the alleged breach.

Mustang Panda Infostealers Expand CoolClient Backdoor
Mustang Panda infostealers are now playing a central role in the Chinese-linked threat actor’s espionage campaigns, marking a clear shift in how the group extracts value from compromised systems. Recent research shows that the CoolClient backdoor has evolved beyond basic remote access and now includes dedicated data-stealing capabilities. This development raises the risk profile of CoolClient infections, especially for government

VoidLink Cloud Malware and the Rise of AI-Built Threats
The discovery of VoidLink cloud malware offers a rare and uncomfortable look at how artificial intelligence is beginning to reshape advanced cybercrime. The framework stands out not simply because it targets Linux or cloud environments, but because researchers uncovered strong evidence that AI played a central role in its planning and construction. Security analysts believe a single developer used AI-assisted

ACF Plugin Vulnerability Allows Admin Access Without Login
A newly disclosed ACF plugin vulnerability has exposed more than 50,000 WordPress sites to potential administrative takeover. The flaw affects a widely used extension designed to enhance Advanced Custom Fields workflows, especially on sites that rely on frontend forms for user registration and profile management. Because these forms often remain publicly accessible, the vulnerability creates a direct path to full

ChatGPT Temporary Chat Gets a Long-Overdue Upgrade
ChatGPT Temporary Chat is receiving a long-overdue upgrade aimed at fixing one of its biggest weaknesses: unclear communication. While the feature has always promised privacy by keeping conversations out of chat history, many users remained unsure about what actually happened to their data. Subtle interface cues and easy-to-miss labels made it difficult to tell temporary chats apart from regular ones.

Zendesk Spam Abuse Targets Global Support Systems
Zendesk spam abuse has triggered a massive global email wave, flooding inboxes with unsolicited messages sent through legitimate customer support systems. The campaign does not rely on malware or phishing links. Instead, it exploits how many companies configure their Zendesk ticket submission workflows, allowing attackers to weaponize trusted infrastructure at scale. The result has been widespread disruption. Victims report receiving

FortiGate Firewall Breach Exposes Network Configurations
A recent FortiGate firewall breach has highlighted how exposed perimeter infrastructure can create serious and lasting security risks. Attackers gained unauthorized access to FortiGate devices by reaching management interfaces that were accessible from the internet. This allowed them to export full configuration files without deploying malware or exploiting a software flaw. The incident shows how operational exposure alone can undermine
