iCloud Storage Full Scam: Protect Your Payment Details
The iCloud storage scam is back with phishing tactics targeting payment information. Learn how to spot fake alerts and protect your Apple account.
Amazon Phishing Scam: Protect Your Account from Fake Emails
Scammers impersonate Amazon support with fake recall emails to steal login credentials. Learn how to spot phishing attempts and protect your account.
Edward Coristine DOGE Fraud Investigation Videos
Former DOGE staffer Edward Coristine collaborates on viral fraud investigation videos with influencer Nick Shirley, raising concerns about unsupported claims.
Rethinking the Cybersecurity Arms Race: When 80% of Ransomware Attacks are AI-Driven
Summary: AI is transforming cyber threats, making attacks faster, adaptive, and autonomous. Analysis of 2,800 ransomware incidents in 2023–2024 found that over 80% were AI-enabled, showing how quickly adversaries have adopted these tools. Groups like LockBit, RansomHub, and BlackCat now deploy AI for reconnaissance, malware generation, deepfake-driven deception, and automated ransom negotiations. Capabilities include intelligent file targeting, polymorphic evasion, ....
MIT Sloan’s “80% of ransomware attacks now use artificial intelligence
Summery: Researchers studied 2,800 ransomware attacks and found that about 80% involved artificial intelligence. Attackers are using AI in many ways: generating phishing content, creating malware, driving deepfake-based social engineering, cracking passwords, and bypassing CAPTCHA systems. The paper argues that just having AI tools for defense isn’t enough. Effective cybersecurity requires three defense layers: Automated hygiene (self-patching, zero-trust architecture, ....
Following Your Stolen Data Through The Dark Web
The Wired video “Following Your Stolen Data Through The Dark Web” explains what happens to personal and corporate information after a cyberattack. It describes how state-sponsored hackers, hacktivists, and criminal groups steal data for different purposes, from espionage to profit. The piece explores how stolen information flows through private networks and dark web marketplaces, where it is sold for ....
Android malware steals your card details and PIN to make instant ATM withdrawals
A new Android malware called NGate steals card details and PINs by abusing NFC features on infected phones. It tricks victims into tapping their physical card against the compromised device, capturing data and one-time codes used for instant ATM withdrawals. Criminals can then clone the card virtually and withdraw cash without needing physical access. The malware spreads through fake ....
Should you let Chrome store your driver’s license and passport?
Google Chrome now lets users store driver’s licenses and passports in its autofill feature, promising encryption and permission-based access. While the data is protected within the browser, experts warn that storing such sensitive details in Chrome increases risk if your Google account is hacked or malware gains access. Chrome’s large market share makes it a tempting target for attackers. ....
The Emergence of Autonomous Cyber Attacks: Analysis and Implications
In mid-November 2025, the report notes that Anthropic detected what appears to be one of the first autonomous AI-driven cyber-espionage campaigns, in which an AI agent (built using Claude Code) carried out most of a multi-stage attack with minimal human oversight. The document argues this marks a major shift: attackers may now scale operations across numerous targets at high ....
A Simple WhatsApp Security Flaw Exposed 3.5 Billion Phone Numbers
Researchers from the University of Vienna found a major flaw in WhatsApp’s contact-discovery feature that let them check tens of billions of phone numbers and extract about 3.5 billion registered user numbers, along with many users’ profile pictures and “about” texts. The weakness stemmed from minimal rate-limiting: they could probe roughly 100 million numbers per hour with no meaningful ....
Fortune 500 scrambles after Anthropic’s warning of automated cyberattacks
According to Axios, executives at major companies (including many in the Fortune 500) are scrambling after Anthropic warned that a Chinese state-sponsored hacker group used its AI agent tools (notably Claude Code) to automate parts of cyber-espionage campaigns. The incident signals a shift in cyber threat landscape, where malicious actors are increasingly harnessing AI agency and automation to scale ....
Fake calendar invites are spreading. Here’s how to remove them and prevent more
The article reveals a surge in fake calendar invites used as phishing attacks, where scammers send events that can’t easily be deleted and often reappear through synced devices, aiming to trick users into calling a number, clicking a link, or attending a fraudulent meeting. It explains how to remove these from platforms like Outlook, Gmail, Android, iPhone, and Mac ....
Holiday scams 2025: These common shopping habits make you the easiest target
The article reveals a surge in fake calendar invites used as phishing attacks, where scammers send events that can’t easily be deleted and often reappear through synced devices, aiming to trick users into calling a number, clicking a link, or attending a fraudulent meeting. It explains how to remove these from platforms like Outlook, Gmail, Android, iPhone, and Mac ....
Holiday shoppers targeted as Amazon and FBI warn of surge in account takeover attacks
Scammers are ramping up their attacks this holiday season, with FBI and Amazon warning of a surge in “account takeover” (ATO) fraud targeting shoppers. According to data from TransUnion, ATO incidents rose 21% from the first half of 2024 to the first half of 2025, and by 141% since the first half of 2021, while the FBI has logged ....
Millions at risk after nationwide CodeRED alert system outage and data breach
A ransomware attack on the CodeRED emergency alert system caused a nationwide outage and exposed personal data for millions of users, putting many communities at risk just as they rely on the service for urgent public warnings. The attackers stole customer information, including email addresses and passwords, which raised concerns about account security for anyone who reused those credentials ....
New ClickFix wave infects users with hidden malware in images and fake Windows updates
Researchers have uncovered a new wave of ClickFix attacks that trick Windows users into installing malware by faking legitimate system update screens and hiding malicious code in images. The scam begins with a full-screen browser page styled to look like the official “Windows Update” interface, prompting users to press Win+R, paste a command, and run it — a command ....
New Android malware lets criminals control your phone and drain your bank account
The article warns about a new strain of Android malware that gives criminals full control of an infected phone and direct access to a victim’s bank accounts. It spreads through fake apps and phishing messages that trick users into granting permissions, after which the malware can read texts, capture screen activity, steal login codes, and bypass security features. Once ....
Cloudflare says it’s investigating the outage that brought down Zoom and LinkedIn
Cloudflare reported that a brief but widespread outage interrupted access to major services like Zoom and LinkedIn after a faulty configuration change disrupted its firewall and related systems. The issue was quickly identified and resolved, with the company confirming it was not the result of a cyberattack. Even though the downtime lasted only minutes, it caused noticeable disruptions because ....
Update Chrome now: Google fixes 13 security issues affecting billions
The article reports that Google has released fixes for 13 security flaws that affect billions of users across Android, Chrome, and other widely used services. Several of the vulnerabilities were serious enough to allow attackers to gain elevated permissions, compromise data, or execute harmful code if a user opened a malicious file or link. Google credited external researchers for ....
Fighting fraud at scale with Mastercard Threat intelligence
he Axios sponsored article explains how Mastercard uses large-scale threat intelligence to fight fraud across the global payments ecosystem. By analyzing vast volumes of real-time transaction data and signals from banks, merchants, and networks, Mastercard can detect suspicious behavior patterns and stop fraud before it spreads. The approach relies on advanced analytics and AI to adapt quickly as criminals ....

