Cyber Security

Cyber Security
Cyber Security

Payouts King Rises as New Ransomware Threat Linked to Former BlackBasta Affiliates

payouts-king-rises-as-new-ransomware-threat-linked-to-former-blackbasta-affiliates

A relatively unknown ransomware group called Payouts King has emerged as a serious cybersecurity threat, carrying the torch of the now-defunct BlackBasta operation. Since its appearance in April 2025, the group has quietly carried out targeted attacks while remaining largely under the radar, combining aggressive data theft with selective file encryption. BlackBasta was one of […]

EUs New Age Verification App Can Be Hacked Within 2 Minutes, Researchers Claim

eus-new-age-verification-app-can-be-hacked-within-2-minutes,-researchers-claim

The European Commission’s newly launched Digital Age Verification App, unveiled on April 14, 2026, to protect minors from harmful online content, has already been compromised, with UK-based security consultant Paul Moore demonstrating a full authentication bypass in under two minutes. During app setup, users are prompted to create a PIN. The app then encrypts this […]

SpankRAT Exploits Windows Explorer Processes for Stealth and Delayed Detection

spankrat-exploits-windows-explorer-processes-for-stealth-and-delayed-detection

A newly identified two-component Remote Access Trojan (RAT) toolkit built in Rust, dubbed SpankRAT, is being used by threat actors to abuse legitimate Windows processes, bypass reputation-based security controls, and maintain persistent access to compromised environments while largely evading detection on VirusTotal. Researchers at ANY.RUN has identified and analyzed the SpankRAT toolkit, flagging it as […]

Two U.S. Nationals Sentenced for Running Laptop Farm for DPRK Remote Workers

two-us.-nationals-sentenced-for-running-laptop-farm-for-dprk-remote-workers

Two American nationals have been sentenced to federal prison for operating a sophisticated “laptop farm” scheme. The operation successfully infiltrated over 100 U.S. companies, generating more than $5 million in illicit revenue to fund the Democratic People’s Republic of Korea (DPRK) and its weapons programs. Kejia Wang, 42, received a 108-month prison sentence, while his […]

Google, Microsoft, Meta Tracking You Even if You Opt Out New Research

google,-microsoft,-meta-tracking-you-even-if-you-opt-out-new-research

In a massive blow to consumer privacy, a new forensic audit reveals that tech giants Google, Microsoft, and Meta are systematically ignoring legally defined privacy opt-out signals. According to the March 2026 California Privacy Audit conducted by webXray, 194 online advertising services are setting tracking cookies even after users explicitly invoke the Global Privacy Control […]

Microsoft Releases Cumulative Update KB5083769 for Windows 11, Version 25H2 and 24H2

microsoft-releases-cumulative-update-kb5083769-for-windows-11,-version-25h2-and-24h2

Microsoft has officially released the April 2026 Patch Tuesday cumulative update, KB5083769, for Windows 11 versions 25H2 and 24H2. Released on April 14, 2026, this mandatory security update addresses system vulnerabilities. It brings significant structural enhancements, advancing the operating system to OS Builds 26200.8246 and 26100.8246, respectively. This update combines the latest security patches with […]

Hackers Create Hidden Mailbox Rules in Microsoft 365 to Intercept Sensitive Business Emails

hackers-create-hidden-mailbox-rules-in-microsoft-365-to-intercept-sensitive-business-emails

Cybercriminals have found a quiet way to sit inside a corporate email account and read everything being sent and received — without the account owner ever knowing. Attackers are now abusing a built-in Microsoft 365 feature called mailbox rules to silently intercept business emails, redirect financial communications, and suppress security notifications, all while staying completely […]

OpenAI Launches GPT-5.4 with Reverse Engineering, Vulnerability and Malware Analysis Features

openai-launches-gpt-5.4-with-reverse-engineering,-vulnerability-and-malware-analysis-features

OpenAI has unveiled GPT-5.4-Cyber, a specialized variant of its flagship GPT-5.4 model fine-tuned for advanced defensive cybersecurity workflows, granting vetted security professionals expanded access to capabilities such as binary reverse engineering, vulnerability scanning, and malware analysis, with fewer restrictions than standard models. GPT-5.4-Cyber is a version of GPT-5.4 specifically trained to lower the refusal boundary […]

Hackers Weaponize Obsidian Shell Commands Plugin to Launch Cross-Platform Malware Attacks

hackers-weaponize-obsidian-shell-commands-plugin-to-launch-cross-platform-malware-attacks

Threat actors have found a clever way to abuse a trusted productivity tool to deliver malware. By weaponizing Obsidian’s Shell Commands community plugin, attackers are quietly executing malicious code on victims’ machines — all without exploiting a single software vulnerability. The campaign, tracked as REF6598, targets individuals working in the financial and cryptocurrency sectors. The […]

Rockstars GTA Game Hacked Attackers published 78.6 Million Records Online

rockstars-gta-game-hacked-attackers-published-78.6-million-records-online

Rockstar Games has confirmed a data breach after the notorious hacking group ShinyHunters exploited a third-party integration to access the company’s internal Snowflake data warehouse, ultimately leaking over 78.6 million records on April 14, 2026. The breach did not stem from a direct attack on Rockstar’s infrastructure. Instead, ShinyHunters leveraged Anodot, an AI-powered cloud cost […]