December 15, 2025

Coupang Data Breach Traced to Former Employee Access

The Coupang data breach did not follow the familiar pattern of modern cyber incidents. There was no ransomware deployment, no phishing campaign, and no external attacker exploiting a technical vulnerability. Instead, the exposure originated inside the company, where a former employee retained access to internal systems after leaving their role. For Coupang, one of South Korea’s largest e-commerce platforms, the

Coupang data breach
December 13, 2025

Inotiv Cyberattack Exposes Data after Confirmed Network Intrusion

Inotiv, a US-based contract research organization supporting pharmaceutical development, has confirmed a serious cyber incident. The Inotiv cyberattack involved unauthorized access to internal systems and confirmed data theft. The disclosure adds to growing concerns about ransomware activity targeting healthcare and life sciences companies. What Happened During the Inotiv Cyberattack Inotiv detected the intrusion in early August after attackers gained access

Inotiv cyberattack
December 11, 2025

DroidLock Android Malware Triggers Full Device Lockouts

Growing reports about DroidLock Android Malware reveal how fast mobile ransomware continues to evolve. The new strain targets users who install apps from untrusted sources and locks their devices with an aggressive screen overlay. Its behaviour shows a worrying shift toward full device takeover on Android systems. How DroidLock Infects Devices Attackers distribute DroidLock through malicious apps found outside official

DroidLock Android Malware
December 9, 2025

Storm-0249 Ransomware Escalation Expands Global Attack Risks

Security teams face rising pressure as new intelligence confirms a clear Storm-0249 ransomware escalation. The threat group, long linked to espionage operations, now intensifies its focus on destructive and financially driven attacks. Microsoft reports that the actors increased their use of custom payloads and enhanced lateral-movement methods. This shift signals a broader strategy that blends intelligence collection with aggressive extortion.

Storm-0249
December 7, 2025

Barts Health NHS Data Breach Tied to Oracle Zero-Day Attack

A major incident unfolded after the Barts Health NHS data breach revealed that attackers exploited an Oracle zero-day flaw to access sensitive information inside one of the UK’s largest healthcare networks. The trust launched an urgent investigation to understand the scope of the compromise. The event highlights growing supply-chain risks as healthcare organizations depend on complex vendor systems for everyday

Barts Health NHS Data Breach
December 5, 2025

Predator Spyware Gains New Zero-Click Attack Vector

Security researchers uncovered a major shift in how Predator spyware infects targets. The platform now uses a new zero-click attack vector that removes the need for user interaction. This evolution strengthens Predator’s ability to compromise devices silently and expands its role in high-stakes surveillance campaigns. How the New Infection Vector Works Cisco Talos revealed that attackers use network injection to

predator spyware
December 4, 2025

Freedom Mobile Data Breach Exposes Customer Info

A recent Freedom Mobile data breach has raised concerns across Canada after attackers accessed customer information through a compromised subcontractor account. The telecom provider reported that unknown actors used stolen credentials to enter its customer account management platform. The incident did not disrupt network operations, but it exposed personal information that can support large-scale social engineering attempts. What Freedom Mobile

Freedom Mobile Data Breach
December 3, 2025

Fake Calendly Invites Target Ad Managers in New AiTM Campaign

Attackers abuse fake Calendly invites in a new phishing wave that aims at agencies, advertisers, and in-house marketing teams. The campaign impersonates major global brands and uses advanced Attacker-in-the-Middle techniques to capture credentials and session tokens. These tactics enable rapid takeovers of Google Workspace and Facebook Business accounts connected to high-value advertising platforms. Researchers note that the operation continues to

Fake Calendly Invites
December 2, 2025

Albiriox Malware Targets 400+ Android Financial Apps

Security researchers warn about the rapid spread of Albiriox malware, a new Android threat built as a malware-as-a-service platform. The campaign focuses on large-scale financial fraud, with operators using the malware to target more than 400 banking, fintech, trading and crypto apps. This model gives even low-skill cybercriminals powerful tools for remote theft and real-time device manipulation. How Albiriox Malware

Albiriox Malware
December 1, 2025

Dartmouth Data Theft Confirmed in Oracle-Linked Breach

Dartmouth data theft concerns escalated after the college confirmed that attackers stole sensitive employee information through an Oracle system compromise. The incident exposed personal details stored in Oracle’s Human Capital Management environment, which Dartmouth relied on for HR operations. The disclosure adds another victim to a growing list of organizations impacted by the Oracle breach campaign. How Dartmouth Confirmed the

Dartmouth Data Theft