Skip to content
Wednesday, Dec 17, 2025
Subscribe

HOME

  • Twitter
  • Facebook
  • LinkedIn
  • Instagram
  • YouTube
  • AI
  • Business
  • Computing
  • Cybersecurity
  • Hardware
  • Innovation
  • Manufacturing
  • Policy
  • Software
  • Startups
  • Technology

Category: Cybersecurity

Ex-CFO Convicted for Stealing $35M in Crypto Scheme
BusinessCybersecurityStartups

Ex-CFO Convicted for Stealing $35M in Crypto Scheme

The former CFO of e-commerce startup Fabric has been convicted on four counts of wire fraud. Nevin Shetty diverted $35 million to his cryptocurrency business without authorization, losing nearly all the funds in high-risk DeFi platforms.

by Tyler Brooks P.ENovember 14, 2025
Police play whack-a-mole with cybercrime gangs in latest takedown
CybersecurityInnovationTechnology

Police play whack-a-mole with cybercrime gangs in latest takedown

International law enforcement coordinated by Europol has dismantled three significant cybercrime operations in what they’re calling Operation Endgame. The takedown targeted Rhadamanthys infostealer, Elysium botnet, and VenomRAT, seizing massive infrastructure and arresting key suspects. Authorities

by Tyler Brooks P.ENovember 13, 2025
China’s Police Training and Surveillance Tech Goes Global
CybersecurityPolicyPrivacy

China’s Police Training and Surveillance Tech Goes Global

China is rapidly expanding its security influence worldwide through police training and surveillance technology exports. According to new research, authoritarian regimes are particularly eager recipients of this assistance. The approach contrasts sharply with Western security cooperation that comes

by Megan CarterNovember 13, 2025
npm’s Latest Worm Floods Registry With 44,000 Spam Packages
CybersecuritySoftwareTechnology

npm’s Latest Worm Floods Registry With 44,000 Spam Packages

A massive npm worm campaign called “IndonesianFoods” has been flooding the registry with spam packages for over two years. The self-replicating packages create exponential dependency chains and may be exploiting the Tea protocol for financial gain through artificial ecosystem inflation.

by Megan CarterNovember 13, 2025
Hyundai’s Massive Data Breach Exposes Millions of SSNs
CybersecurityDataPrivacy

Hyundai’s Massive Data Breach Exposes Millions of SSNs

Hyundai is notifying millions of drivers about a massive data breach that exposed sensitive personal information. The hack affected Hyundai AutoEver America systems from February 22 through March 2, potentially compromising social security numbers and driver license data.

by Megan CarterNovember 12, 2025
Google’s Password Warning Just Got More Urgent
CybersecurityPrivacyTechnology

Google’s Password Warning Just Got More Urgent

Google is escalating warnings for all Gmail users to stop using passwords entirely. With email attacks increasing 13% and millions of accounts compromised, the shift to passkeys is no longer optional for security-conscious users.

by Megan CarterNovember 11, 2025
Facebook advertisers hit by massive phishing campaign
BusinessCybersecurityPrivacy

Facebook advertisers hit by massive phishing campaign

More than 5,000 Facebook advertisers were targeted by tens of thousands of phishing emails sent from Facebook’s legitimate domain. The sophisticated campaign used fake business pages and urgent language to steal credentials from companies across multiple industries. Security researchers warn this re

by Tyler Brooks P.ENovember 10, 2025
Russian hacker pleads guilty to US ransomware attacks
BusinessCybersecurityPrivacy

Russian hacker pleads guilty to US ransomware attacks

A 25-year-old Russian national has pleaded guilty to working as an initial access broker for the Yanluowang ransomware crew. He provided network credentials to hackers and took cuts of ransom payments totaling millions of dollars from US victims.

by Tyler Brooks P.ENovember 10, 2025
Samsung Galaxy phones hacked for months via malicious images
CybersecurityPrivacyTechnology

Samsung Galaxy phones hacked for months via malicious images

Security researchers uncovered Landfall spyware that exploited a Samsung zero-day vulnerability through malicious images. The campaign ran undetected for nearly a year, targeting specific individuals across the Middle East and North Africa. Victims’ devices could be fully compromised without any cli

by Tyler Brooks P.ENovember 8, 2025
FBI Goes After Mysterious Archive.today Operator
CybersecurityPrivacyTechnology

FBI Goes After Mysterious Archive.today Operator

The FBI sent a secret subpoena to domain registrar Tucows demanding information about who operates Archive.today. The site immediately posted the document publicly with the word “canary.” This comes amid a broader crackdown on paywall-bypass services.

by Megan CarterNovember 7, 2025

Posts pagination

Previous 1 … 4 5 6 … 17 Next

Archives

  • December 2025
  • November 2025
  • October 2025

Categories

  • Technology (946)
  • Business (758)
  • Innovation (517)
  • AI (511)
  • Software (450)
  • Computing (204)
  • Policy (201)
  • Hardware (173)
  • Cybersecurity (161)
  • Assistive Technology (157)
  • Startups (138)
  • Arts and Entertainment (123)
  • Manufacturing (106)
  • Science (97)
  • Cloud (85)
  • Privacy (81)
  • Software Guides (79)
  • Semiconductors (73)
  • Economy and Trading (69)
  • Gaming (68)

Featured Posts

The North East is quietly building a UK space powerhouse
The North East is quietly building a UK…
December 12, 2025
Carbon dioxide in the atmosphere up by record amount in 2024: UN
Carbon dioxide in the atmosphere up by record…
October 16, 2025
Qualcomm’s AI Data Center Push Faces Uphill Battle
Qualcomm’s AI Data Center Push Faces Uphill Battle
October 27, 2025

Gallery

Qualcomm's AI Inference Push Challenges Nvidia Dominance - According to TechPowerUp, Qualcomm has unveiled its AI200 and AI25
Michael Burry's Substack Chat Is Pure Chaos - Professional coverage
iPadOS 26.1: Apple's Quiet Course Correction Signals Deeper Strategy - Professional coverage
Pine Labs' Strategic IPO: Valuation Reset for Global Fintech Ambitions - Professional coverage
Multiphysics Modeling Powers Electrification's Future - Professional coverage

Recent Posts

X scrambles to save the Twitter trademark after legal threat
X scrambles to save the Twitter trademark after…
December 16, 2025
Apple’s 2026 New Year Challenge Wants Your Watch Rings Closed
Apple’s 2026 New Year Challenge Wants Your Watch…
December 16, 2025
OpenAI Hires a Politician to Sell Its “Democratic AI” Vision
OpenAI Hires a Politician to Sell Its “Democratic…
December 16, 2025
Quick Links
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms of Service
  • Report Content

© 2025 News. All Rights Reserved.