iCloud Storage Full Scam: Protect Your Payment Details
The iCloud storage scam is back with phishing tactics targeting payment information. Learn how to spot fake alerts and protect your Apple account.
Amazon Phishing Scam: Protect Your Account from Fake Emails
Scammers impersonate Amazon support with fake recall emails to steal login credentials. Learn how to spot phishing attempts and protect your account.
Edward Coristine DOGE Fraud Investigation Videos
Former DOGE staffer Edward Coristine collaborates on viral fraud investigation videos with influencer Nick Shirley, raising concerns about unsupported claims.
Rethinking the Cybersecurity Arms Race: When 80% of Ransomware Attacks are AI-Driven
Summary: AI is transforming cyber threats, making attacks faster, adaptive, and autonomous. Analysis of 2,800 ransomware incidents in 2023–2024 found that over 80% were AI-enabled, showing how quickly adversaries have adopted these tools. Groups like LockBit, RansomHub, and BlackCat now deploy AI for reconnaissance, malware generation, deepfake-driven deception, and automated ransom negotiations. Capabilities include ....
MIT Sloan’s “80% of ransomware attacks now use artificial intelligence
Summery: Researchers studied 2,800 ransomware attacks and found that about 80% involved artificial intelligence. Attackers are using AI in many ways: generating phishing content, creating malware, driving deepfake-based social engineering, cracking passwords, and bypassing CAPTCHA systems. The paper argues that just having AI tools for defense isn’t enough. Effective cybersecurity requires three defense layers: ....
Following Your Stolen Data Through The Dark Web
The Wired video “Following Your Stolen Data Through The Dark Web” explains what happens to personal and corporate information after a cyberattack. It describes how state-sponsored hackers, hacktivists, and criminal groups steal data for different purposes, from espionage to profit. The piece explores how stolen information flows through private networks and dark web marketplaces, ....
Android malware steals your card details and PIN to make instant ATM withdrawals
A new Android malware called NGate steals card details and PINs by abusing NFC features on infected phones. It tricks victims into tapping their physical card against the compromised device, capturing data and one-time codes used for instant ATM withdrawals. Criminals can then clone the card virtually and withdraw cash without needing physical access. ....
Should you let Chrome store your driver’s license and passport?
Google Chrome now lets users store driver’s licenses and passports in its autofill feature, promising encryption and permission-based access. While the data is protected within the browser, experts warn that storing such sensitive details in Chrome increases risk if your Google account is hacked or malware gains access. Chrome’s large market share makes it ....
The Emergence of Autonomous Cyber Attacks: Analysis and Implications
In mid-November 2025, the report notes that Anthropic detected what appears to be one of the first autonomous AI-driven cyber-espionage campaigns, in which an AI agent (built using Claude Code) carried out most of a multi-stage attack with minimal human oversight. The document argues this marks a major shift: attackers may now scale operations ....
A Simple WhatsApp Security Flaw Exposed 3.5 Billion Phone Numbers
Researchers from the University of Vienna found a major flaw in WhatsApp’s contact-discovery feature that let them check tens of billions of phone numbers and extract about 3.5 billion registered user numbers, along with many users’ profile pictures and “about” texts. The weakness stemmed from minimal rate-limiting: they could probe roughly 100 million numbers ....

