Over 20,000 crypto fraud victims identified in international crackdown
An international law enforcement action led by the U.K.’s National Crime Agency (NCA) has identified over 20,000 victims of cryptocurrency
Google Launches Gmail End-to-End Encryption for Android and iOS
Google has officially rolled out End-to-End Encryption (E2EE) for the Gmail application on Android and iOS devices. This major update
Google Unveils Device-Bound Chrome Sessions in Anti-Cookie-Theft Move
Google officially announced the public rollout of Device Bound Session Credentials (DBSC) for Windows users on Chrome 146. According to
Citizen Lab: Law Enforcement Used Webloc to Track 500 Million Devices via Ad Data
Hungarian domestic intelligence, the national police in El Salvador, and several U.S. law enforcement and police departments have been attributed to
Ransomware Gangs Expand Use of EDR Killers Beyond Vulnerable Drivers, ESET Warns
In recent years, Endpoint Detection and Response (EDR) killers have become a standard, highly effective weapon in modern ransomware intrusions.
Hacker Uses Claude and ChatGPT to Breach Multiple Government Agencies
A single threat actor compromised nine Mexican government agencies and stole hundreds of millions of citizen records in a highly
Anthropic Launches Claude Beta for Word, Bringing AI-Powered Editing to Microsoft Docs
Anthropic has officially launched Claude for Word in public beta, bringing its AI assistant directly into Microsoft Word as a
ChatGPT rolls out new $100 Pro subscription to challenge Claude
OpenAI has rolled out a new Pro subscription that costs $100 and is in line with Claude’s pricing, which also
EngageSDK Vulnerability Exposes Millions of Crypto Wallet Users to Cyberattacks
A serious security flaw found inside a widely used Android library called EngageSDK has put over 30 million cryptocurrency wallet
Nearly 4,000 US industrial devices exposed to Iranian cyberattacks
The attack surface targeted by Iranian-linked hackers in cyberattacks against U.S. critical infrastructure networks includes thousands of Internet-exposed programmable logic
Analysis of one billion CISA KEV remediation records exposes limits of human-scale security
Author: Saeed Abbasi, Senior Manager, Threat Research Unit, Qualys With Time-to-Exploit now at negative seven days and autonomous AI agents
GlassWorm Campaign Uses Zig Dropper to Infect Multiple Developer IDEs
Ravie LakshmananApr 10, 2026Malware / Blockchain Cybersecurity researchers have flagged yet another evolution of the ongoing GlassWorm campaign, which employs a