Coupang Data Breach Traced to Former Employee Access
The Coupang data breach did not follow the familiar pattern of modern cyber incidents. There was no ransomware deployment, no phishing campaign, and no external attacker exploiting a technical vulnerability. Instead, the exposure originated inside the company, where a former employee retained access to internal systems after leaving their role. For Coupang, one of South Korea’s largest e-commerce platforms, the

Inotiv Cyberattack Exposes Data after Confirmed Network Intrusion
Inotiv, a US-based contract research organization supporting pharmaceutical development, has confirmed a serious cyber incident. The Inotiv cyberattack involved unauthorized access to internal systems and confirmed data theft. The disclosure adds to growing concerns about ransomware activity targeting healthcare and life sciences companies. What Happened During the Inotiv Cyberattack Inotiv detected the intrusion in early August after attackers gained access

DroidLock Android Malware Triggers Full Device Lockouts
Growing reports about DroidLock Android Malware reveal how fast mobile ransomware continues to evolve. The new strain targets users who install apps from untrusted sources and locks their devices with an aggressive screen overlay. Its behaviour shows a worrying shift toward full device takeover on Android systems. How DroidLock Infects Devices Attackers distribute DroidLock through malicious apps found outside official

Storm-0249 Ransomware Escalation Expands Global Attack Risks
Security teams face rising pressure as new intelligence confirms a clear Storm-0249 ransomware escalation. The threat group, long linked to espionage operations, now intensifies its focus on destructive and financially driven attacks. Microsoft reports that the actors increased their use of custom payloads and enhanced lateral-movement methods. This shift signals a broader strategy that blends intelligence collection with aggressive extortion.

Barts Health NHS Data Breach Tied to Oracle Zero-Day Attack
A major incident unfolded after the Barts Health NHS data breach revealed that attackers exploited an Oracle zero-day flaw to access sensitive information inside one of the UK’s largest healthcare networks. The trust launched an urgent investigation to understand the scope of the compromise. The event highlights growing supply-chain risks as healthcare organizations depend on complex vendor systems for everyday

Predator Spyware Gains New Zero-Click Attack Vector
Security researchers uncovered a major shift in how Predator spyware infects targets. The platform now uses a new zero-click attack vector that removes the need for user interaction. This evolution strengthens Predator’s ability to compromise devices silently and expands its role in high-stakes surveillance campaigns. How the New Infection Vector Works Cisco Talos revealed that attackers use network injection to

Freedom Mobile Data Breach Exposes Customer Info
A recent Freedom Mobile data breach has raised concerns across Canada after attackers accessed customer information through a compromised subcontractor account. The telecom provider reported that unknown actors used stolen credentials to enter its customer account management platform. The incident did not disrupt network operations, but it exposed personal information that can support large-scale social engineering attempts. What Freedom Mobile

Fake Calendly Invites Target Ad Managers in New AiTM Campaign
Attackers abuse fake Calendly invites in a new phishing wave that aims at agencies, advertisers, and in-house marketing teams. The campaign impersonates major global brands and uses advanced Attacker-in-the-Middle techniques to capture credentials and session tokens. These tactics enable rapid takeovers of Google Workspace and Facebook Business accounts connected to high-value advertising platforms. Researchers note that the operation continues to

Albiriox Malware Targets 400+ Android Financial Apps
Security researchers warn about the rapid spread of Albiriox malware, a new Android threat built as a malware-as-a-service platform. The campaign focuses on large-scale financial fraud, with operators using the malware to target more than 400 banking, fintech, trading and crypto apps. This model gives even low-skill cybercriminals powerful tools for remote theft and real-time device manipulation. How Albiriox Malware

Dartmouth Data Theft Confirmed in Oracle-Linked Breach
Dartmouth data theft concerns escalated after the college confirmed that attackers stole sensitive employee information through an Oracle system compromise. The incident exposed personal details stored in Oracle’s Human Capital Management environment, which Dartmouth relied on for HR operations. The disclosure adds another victim to a growing list of organizations impacted by the Oracle breach campaign. How Dartmouth Confirmed the
