• Business
  • Entertainment
  • Health
  • News
  • Sport
  • Tech
  • World
Newsy Today
news of today
Home - cybersecurity - Page 2
Tag:

cybersecurity

Tech

Barracuda spots 7 million device code phishing attacks

by Chief Editor April 24, 2026
written by Chief Editor

The Industrialization of Identity Theft: The PhaaS Evolution

The landscape of cybercrime is shifting from manual, targeted attacks to a highly scalable business model. The emergence of Phishing-as-a-Service (PhaaS) platforms, such as the EvilTokens kit, allows low-skill criminals to launch sophisticated campaigns that were once the sole domain of advanced threat actors.

This “industrialization” means that high-volume attacks are now easier to execute. For example, security firm Barracuda recently detected over 7 million device code phishing attacks within a single four-week window. By packaging complex exploits into ready-to-use kits sold on platforms like Telegram, the barrier to entry for attackers has vanished.

Did you recognize? Device code phishing is particularly dangerous since it doesn’t rely on fake login pages. Instead, it tricks users into using the legitimate Microsoft login portal, making it nearly invisible to traditional “spot the fake URL” training.

Beyond the Password: The Shift to Token Hijacking

For years, security training focused on preventing credential theft. However, we are seeing a strategic pivot toward hijacking trusted authentication flows. Instead of stealing a password, attackers are now targeting OAuth 2.0 access and refresh tokens.

View this post on Instagram about Microsoft, Phishing
From Instagram — related to Microsoft, Phishing

By abusing the device authorization flow—originally designed for devices with limited interfaces like printers or smart TVs—attackers can gain authorized access to Microsoft 365 and Entra ID environments. Once a victim enters a legitimate code on a real Microsoft page, the attacker receives the token directly.

This method provides three critical advantages for the attacker:

  • Stealth: No cloned websites are used, bypassing many email filters.
  • MFA Bypass: Because the victim authorizes the device themselves, multifactor authentication (MFA) and conditional access checks are often bypassed.
  • Persistence: Refresh tokens can grant attackers access for days or weeks, remaining effective even if the user changes their password.

The Next Frontier: Cross-Platform Expansion

While current surges heavily target Microsoft ecosystems, the trend is moving toward cross-platform versatility. The developers behind the EvilTokens kit have already indicated plans to extend their phishing capabilities to include Gmail and Okta phishing pages.

How fast is a BARRACUDA ATTACK? FREE CODE FRIDAY : DIGITAL CODES Magic Mike 7th son

This suggests a future where “identity-agnostic” phishing kits can pivot between different cloud providers depending on the target’s infrastructure. We are already seeing diverse threat actors—including Russian groups like Storm-237, UTA032, UTA0355, UNK_AcademicFlare, and TA2723, as well as the ShinyHunters data extortion group—leveraging these advanced techniques.

Pro Tip: To mitigate this risk, organizations should implement layered security controls, including advanced email filtering and continuous monitoring of identity protection mechanisms. Tighter controls around device authorization flows are essential to stop token abuse.

Redefining the Human Firewall

The rise of device code phishing renders traditional “look for the padlock” or “check the domain” advice obsolete. Since the final step of the attack happens on a genuine site (such as microsoft.com/devicelogin), the battle has shifted from technical detection to contextual awareness.

Future security training must move beyond identifying “fake” sites and instead teach users to question the reason for a request. If a user is asked to enter a verification code for a device they didn’t intentionally link, it should be treated as a critical red flag, regardless of how legitimate the website appears.

Attackers are increasingly tailoring their lures to specific roles. Recent campaigns have used PDFs, HTML, and DOCX files impersonating financial documents, payroll notices, or SharePoint shares to target employees in HR, finance, logistics, and sales.

Frequently Asked Questions

What is device code phishing?
It’s an attack that abuses the OAuth 2.0 device authorization flow. Attackers trick users into entering a legitimate device code on an official login page, which grants the attacker an access token to the user’s account.

Can MFA stop device code phishing?
Not necessarily. Because the victim is the one performing the authentication on a trusted device, they effectively “approve” the attacker’s session, potentially bypassing MFA and conditional access checks.

What is EvilTokens?
EvilTokens is a Phishing-as-a-Service (PhaaS) kit that automates device code phishing attacks, primarily targeting Microsoft 365 and Entra ID environments.

How do I protect my organization?
Implement layered security, use advanced email filtering, monitor for unusual identity patterns, and train staff to never enter device codes unless they initiated the request themselves.


Are you confident in your current identity protection strategy? Share your thoughts in the comments below or subscribe to our newsletter for the latest updates on evolving cyber threats.

April 24, 2026 0 comments
0 FacebookTwitterPinterestEmail
Business

Unauthorized group has gained access to Anthropic’s exclusive cyber tool Mythos, report claims

by Chief Editor April 22, 2026
written by Chief Editor

The Double-Edged Sword of AI Security Tools

The emergence of specialized AI models like Anthropic’s Mythos highlights a growing tension in the tech industry: the “dual-use” dilemma. While Mythos was designed as a cybersecurity tool to bolster enterprise security, the company itself has warned that in the wrong hands, it could be transformed into a potent hacking tool.

View this post on Instagram about Mythos, Anthropic
From Instagram — related to Mythos, Anthropic

This shift suggests a future where the line between a security asset and a security liability is razor-thin. When a tool is powerful enough to identify vulnerabilities for the purpose of fixing them, it is inherently powerful enough to exploit those same gaps if weaponized against corporate security.

Did you know? Anthropic implemented an initiative called Project Glasswing to manage the limited release of the Mythos model. This was specifically designed to prevent the tool from falling into the hands of bad actors.

The Third-Party Vulnerability Gap

The recent unauthorized access to the Mythos preview underscores a critical trend in AI deployment: the third-party vendor risk. According to reports from Bloomberg, access was gained through a third-party vendor environment.

The Third-Party Vulnerability Gap
Mythos Anthropic Discord

As AI companies partner with contractors and external vendors for testing and implementation, the security perimeter expands. The Mythos incident demonstrates that a model’s security is only as strong as the weakest link in the supply chain. In this case, the unauthorized group utilized the access of an individual employed at a third-party contractor working for Anthropic.

For enterprises, In other words that “exclusive” or “private” releases are not a guarantee of security if the vendor management process has gaps.

The Rise of AI “Model Hunting” Communities

We are seeing the rise of highly organized groups—often operating within platforms like Discord—that specialize in seeking out unreleased AI models. These are not always traditional “hackers” looking to wreak havoc, but often enthusiasts interested in “playing around” with new technology.

Unauthorized group has gained access to Anthropic’s exclusive cyber tool Mythos, report claims

The method used to access Mythos is particularly telling. The group made an “educated guess” about the model’s online location by analyzing the URL formats Anthropic had used for previous models. This suggests that as AI companies standardize their deployment patterns, they may inadvertently create predictable paths for unauthorized users to discover hidden previews.

Pro Tip: For organizations deploying sensitive AI previews, avoid using predictable naming conventions or URL structures. Implementing zero-trust architecture at the vendor level is essential to prevent unauthorized lateral movement.

The Shift Toward Hyper-Restricted AI Releases

To mitigate the risk of weaponization, AI developers are moving away from broad betas toward highly curated releases. Mythos was provided to a select few, including major entities like Apple, to ensure the tool remained a defensive asset.

The Shift Toward Hyper-Restricted AI Releases
Mythos Anthropic Project Glasswing

Future trends indicate a move toward “walled garden” AI ecosystems where access is tied to strict identity verification and monitored environments. However, as the Mythos case shows, even these restricted environments are susceptible if a single authorized user’s access is compromised or bypassed.

Frequently Asked Questions

What is the Mythos AI model?
Mythos is a cybersecurity tool developed by Anthropic designed for enterprise security, though it has the potential to be used as a hacking tool if accessed by unauthorized users.

How was Mythos accessed by unauthorized users?
A group in a Discord channel gained access through a third-party vendor environment, partly by guessing the model’s online location based on previous Anthropic model formats.

What is Project Glasswing?
Project Glasswing is an initiative by Anthropic to limit the release of the Mythos model to a select number of vendors to prevent its employ by bad actors.

Has this breach impacted Anthropic’s internal systems?
An Anthropic spokesperson stated that the company has found no evidence that the unauthorized activity impacted Anthropic’s own systems.

What do you feel? Is the risk of AI weaponization enough to justify keeping powerful security tools hidden from the broader community? Let us know your thoughts in the comments below or subscribe to our newsletter for more deep dives into AI security.

April 22, 2026 0 comments
0 FacebookTwitterPinterestEmail
World

Law enforcement targets 75,000 suspected DDoS service users

by Chief Editor April 20, 2026
written by Chief Editor

The Democratization of Digital Chaos: The Rise of DDoS-for-Hire

For years, launching a massive Distributed Denial of Service (DDoS) attack required a level of technical sophistication that limited the pool of perpetrators to seasoned hackers or state-sponsored actors. That era is officially over.

View this post on Instagram about Operation, Europol
From Instagram — related to Operation, Europol

The emergence of “stresser” and “booter” services—essentially DDoS-for-hire platforms—has turned cyber warfare into a commodity. As seen in recent global crackdowns like Operation PowerOFF, these services allow anyone with a credit card and a grudge to knock a website offline for as little as $45 a month.

This “Uber-ization” of cybercrime is a dangerous trend. When the barrier to entry drops, the volume of attacks skyrockets. We are no longer just dealing with professional criminals; we are dealing with “script kiddies” and disgruntled teenagers who may not fully grasp the legal ramifications of their actions until a warning letter from Europol arrives in their mailbox.

Did you know? Some DDoS-for-hire platforms have claimed to facilitate over 140 million attacks. The sheer scale shows that these aren’t just niche tools, but industrial-scale engines of disruption.

The AI Arms Race: Smarter Botnets and Adaptive Attacks

Looking ahead, the biggest shift in the DDoS landscape will be the integration of Artificial Intelligence. While defenders use AI to detect traffic anomalies, attackers are beginning to use LLMs and machine learning to optimize their strikes.

Future botnets won’t just flood a server with “dumb” traffic; they will use AI to mimic human behavior, making it nearly impossible for traditional firewalls to distinguish between a legitimate customer and a malicious bot.

We are moving toward “Adaptive DDoS,” where the attack evolves in real-time. If a target blocks a specific IP range or implements a CAPTCHA, the AI-driven botnet will automatically pivot its strategy, changing packet headers or rotating proxies to bypass the defense.

The IoT Vulnerability Gap

The growth of the Internet of Things (IoT) provides the perfect fuel for this fire. Millions of unsecured smart cameras, refrigerators, and industrial sensors are essentially “zombie” devices waiting to be recruited into a botnet.

As critical infrastructure—from power grids to water treatment plants—becomes more connected, the potential for a “mega-botnet” increases. A coordinated attack using millions of IoT devices could potentially cripple entire city services, moving the threat from “annoying website downtime” to “public safety crisis.”

Pro Tip: To protect your business, don’t rely solely on a standard firewall. Implement a cloud-based scrubbing service (like Cloudflare or Akamai) that can absorb terabits of traffic before it ever reaches your origin server.

The New Law Enforcement Playbook: Psychological Warfare

The strategy employed in Operation PowerOFF signals a fundamental shift in how international agencies like the DoJ and Europol fight cybercrime. Traditionally, the goal was “seize and arrest.” Now, the goal is “deter and discourage.”

How Do You Identify A DDoS Attack? – Law Enforcement Insider

By sending tens of thousands of warning letters to suspected users, law enforcement is utilizing psychological deterrence. They are letting the perpetrators know: “We have your data. We know who you are. We are watching.”

This proactive approach is far more scalable than trying to arrest 75,000 individuals across 21 different countries. By targeting the “customers” of the DDoS ecosystem, authorities are effectively drying up the revenue streams that keep these illegal platforms operational.

We can expect more of this “preventative policing,” including targeted ads on search engines to warn potential buyers and the use of blockchain analysis to track payments back to real-world identities.

Beyond DDoS: The Ecosystem of Stolen Data

DDoS attacks are often just the smokescreen. In many cases, a DDoS attack is used to distract IT teams while a more sinister breach occurs in the background—such as the theft of sensitive data sold on marketplaces like the now-dismantled LeakBase.

The synergy between DDoS-for-hire and data-brokerage forums creates a comprehensive “crime-as-a-service” economy. When one pillar falls, the others often struggle, which is why coordinated international strikes are the only effective way to dismantle these networks.

Frequently Asked Questions

What is a DDoS-for-hire service?
These are illegal platforms (often called “stressers” or “booters”) that allow users to pay a fee to flood a target website or server with traffic, causing it to crash or become unavailable.

Are these services legal if I’m just “testing” my own site?
While stress-testing your own infrastructure is legal, using a third-party “booter” service often involves utilizing an illegal botnet of compromised devices, which can lead to legal trouble regardless of the target.

How do law enforcement agencies find these users?
Agencies often seize the servers of the DDoS providers, gaining access to user databases, payment logs, and IP addresses. They also use blockchain forensics to trace cryptocurrency payments.

Can a small business survive a DDoS attack?
Yes, provided they have the right mitigation strategy. Using Content Delivery Networks (CDNs) and specialized DDoS protection services can neutralize most attacks before they impact the end user.

Stay Ahead of the Threat

Cyber threats evolve every hour. Are you and your business protected against the next wave of AI-driven attacks?

Join the conversation: Have you ever experienced a DDoS attack or seen a “stresser” ad online? Let us know in the comments below, or subscribe to our security newsletter for weekly deep dives into the world of cybersecurity.

April 20, 2026 0 comments
0 FacebookTwitterPinterestEmail
Tech

Hackers are abusing unpatched Windows security flaws to hack into organizations

by Chief Editor April 17, 2026
written by Chief Editor

The High-Stakes Game of Full Disclosure

The tension between independent security researchers and software giants is reaching a breaking point. Traditionally, the industry relies on “coordinated vulnerability disclosure,” where a researcher reports a flaw privately to a company, allowing them to patch it before the public finds out.

View this post on Instagram about Microsoft, Full
From Instagram — related to Microsoft, Full

However, we are seeing a rise in “full disclosure.” This occurs when communication breaks down—often due to conflicts with entities like Microsoft’s Security Response Center (MSRC)—and researchers publish the vulnerability details and “proof-of-concept” (PoC) code openly on platforms like GitHub or personal blogs.

While researchers may leverage this tactic to prove the severity of a flaw or pressure a vendor into action, it creates a dangerous window of opportunity. When PoC code is published, it essentially provides a blueprint for cybercriminals and government hackers to launch attacks before a patch is even available.

Did you grasp? “Full disclosure” can turn a hidden flaw into “ready-made attacker tooling,” significantly shortening the time it takes for a vulnerability to be weaponized in the wild.

From PoC to Weapon: The Speed of Modern Exploits

The window between a vulnerability being disclosed and its active exploitation is shrinking. Recent activity involving the researcher known as Chaotic Eclipse (or Nightmare-Eclipse) illustrates this acceleration.

For instance, the BlueHammer exploit was published as a PoC on April 3, and by April 10, it was already being observed in the wild. Even more alarming was the release of the RedSun and UnDefend exploits on April 16, which were observed being used by threat actors on the very same day.

This trend suggests that threat actors are now monitoring researcher repositories in real-time. Once code is uploaded to GitHub, it is almost immediately integrated into attack chains, often following typical enumeration commands like whoami /priv and net group to identify system privileges.

As John Hammond of Huntress notes, this creates a constant “tug-of-war” where defenders must frantically race against adversaries who are using pre-made tools to breach organizations.

Targeting the Guardians: Why Security Software is the New Front Line

A critical trend in modern cyberattacks is the targeting of the security software itself. Instead of trying to bypass an antivirus, hackers are finding ways to exploit it to gain higher privileges or disable it entirely.

1 Billion PCs Vulnerable: The Unpatched "BlueHammer" Windows 0-Day #cybersecurity #vulnerability

The recent exploitation of Microsoft Defender highlights two dangerous techniques:

  • Local Privilege Escalation (LPE): Vulnerabilities like BlueHammer (CVE-2026-33825) and RedSun allow attackers to gain administrator or high-level access to a compromised system.
  • Denial-of-Service (DoS) for Defense: The UnDefend vulnerability allows a standard user to block Microsoft Defender from receiving critical signature updates or disable the software completely.

By neutralizing the “guardian” of the system, attackers can operate with much higher stealth, ensuring that their subsequent malicious activities go undetected by the very tools meant to stop them.

Pro Tip: To mitigate the risk of LPE and DoS attacks on security software, ensure your systems are updated immediately during Patch Tuesday cycles. Even when some flaws remain unpatched, applying available fixes for known CVEs like CVE-2026-33825 reduces the overall attack surface.

FAQ: Understanding Modern Zero-Day Trends

What is a zero-day vulnerability?

A zero-day is a security flaw that is known to the discoverer (and potentially attackers) but is unknown to the software vendor, meaning the vendor has “zero days” to fix it before it can be exploited.

FAQ: Understanding Modern Zero-Day Trends
Microsoft Microsoft Defender Defender

What is the difference between a PoC and a weaponized exploit?

A Proof-of-Concept (PoC) is code designed to demonstrate that a vulnerability exists. A weaponized exploit is a refined version of that code, optimized by attackers to reliably breach systems, evade detection, and deliver a malicious payload.

Why would a researcher publish a flaw before it is patched?

Researchers may resort to full disclosure if they experience the vendor is ignoring the report, downplaying the severity of the risk, or if the coordinated disclosure process has failed.

For more insights into endpoint security and vulnerability management, explore our security guides or read about recent Microsoft Defender threats.

Join the Conversation: Do you think “full disclosure” is a necessary evil to force vendors to patch faster, or does it do more harm than good? Let us know in the comments below or subscribe to our newsletter for the latest in cybersecurity trends.

April 17, 2026 0 comments
0 FacebookTwitterPinterestEmail
World

European police email 75,000 people asking them to stop DDoS attacks

by Chief Editor April 16, 2026
written by Chief Editor

The Rise of the ‘Amateur Hacker’: The Evolution of DDoS-for-Hire

Cyberattacks are no longer the exclusive domain of elite coding experts. A troubling trend has emerged where the barrier to entry for launching a massive digital assault has virtually disappeared. The rise of “DDoS-for-hire” services—often marketed as IP stressors or booters—has democratized cybercrime, allowing individuals with little to no technical knowledge to knock websites and servers offline.

View this post on Instagram about The Rise, Amateur Hacker
From Instagram — related to The Rise, Amateur Hacker

These services function as a plug-and-play model for disruption. By paying a fee, a user can inundate a target with junk traffic, rendering legitimate services inaccessible to real users. This shift toward “crime-as-a-service” means that the threat landscape is expanding from professional syndicates to anyone with a credit card and a grudge.

Did you know? Law enforcement agencies recently obtained data on more than 3 million alleged criminal user accounts from seized databases during a global crackdown on these services.

Beyond the Code: The Shifting Motivations of Digital Attacks

Even as financial gain through extortion remains a primary driver, the motivations behind using DDoS-for-hire tools have diversified. We are seeing a surge in attacks driven by curiosity, ideological goals linked to hacktivism, and strategic attempts to disrupt competitors’ services.

Because these tools are so accessible and often reach with tutorials, they attract a younger demographic. This has forced authorities to change their tactics, moving beyond simple takedowns to active prevention. For instance, law enforcement has begun creating search engine ads specifically designed to target young people searching for DDoS-for-hire tools, steering them away from criminal activity before they begin.

The Scale of the Threat

The sheer volume of traffic these attacks can generate is staggering. To put the scale into perspective, Cloudflare reported mitigating a DDoS attack that reached a peak of 29.7 terabits per second. As infrastructure scales, the potential for these “junk traffic” floods to cause widespread systemic failure increases.

The number of police officers per 100,000 people in European countries.

Operation PowerOFF: A Blueprint for Global Response

The recent coordinated effort known as Operation PowerOFF, supported by Europol, reveals how global law enforcement is evolving to fight these decentralized threats. Rather than just targeting the providers, authorities are now targeting the users.

The operation resulted in the takedown of 53 domains and the arrest of four individuals. However, the most significant psychological blow was the delivery of warning emails and letters to over 75,000 suspected users, explicitly telling them to halt their activities. This approach signals a shift toward mass deterrence.

Pro Tip: For businesses, the best defense against DDoS attacks is a multi-layered mitigation strategy. Relying on a single firewall is rarely enough; utilizing a Content Delivery Network (CDN) and scrubbing services can help filter out junk traffic before it reaches your server.

Future Trends in Network Disruption

Looking ahead, One can expect the battle between booters and defenders to intensify. As law enforcement removes URLs from search engine results and dismantles infrastructure, providers will likely move toward more encrypted or hidden communication channels to recruit “amateur” users.

We are also likely to see more regional targeting. Data suggests that users often target servers and websites within their own continent, focusing on online marketplaces and telecommunications providers. This regional focus makes the attacks more impactful for the perpetrator’s immediate social or political environment.

Key Takeaways from Recent Crackdowns:

  • Infrastructure Seizure: Takedowns now include the dismantling of servers and databases, not just the front-end domains.
  • User Identification: Seized databases are being used to identify and warn tens of thousands of participants.
  • Search Engine Intervention: Removing advertising URLs and using counter-ads is becoming a standard part of the law enforcement toolkit.

Frequently Asked Questions

What is a DDoS-for-hire service?
It is a service (often called a booter or IP stresser) that allows people to pay a fee to launch a Distributed Denial-of-Service attack, which floods a target website with traffic to accept it offline.

Key Takeaways from Recent Crackdowns:
Operation Amateur Hacker

Who typically uses these tools?
Users range from professional cybercriminals to “amateur hackers” motivated by curiosity, hacktivism, or financial gain.

How does Operation PowerOFF differ from previous efforts?
While previous operations focused on the providers, Operation PowerOFF emphasized identifying and warning the end-users, sending alerts to over 75,000 individuals.

Is your business prepared for a surge in automated attacks? Share your thoughts in the comments below or subscribe to our newsletter for the latest in cybersecurity intelligence.

April 16, 2026 0 comments
0 FacebookTwitterPinterestEmail
Health

Georgia Tech Researchers Develop First Genetic Passcode Lock to Protect Valuable DNA

by Chief Editor April 9, 2026
written by Chief Editor

The Bio-Security Revolution: Protecting Tomorrow’s Trillion-Dollar Biotech Industry

The biotechnology industry is facing a growing threat: the theft and misuse of valuable engineered cell lines. Recent reports from the Centers for Disease Control and Prevention (CDC) and the Department of Homeland Security (DHS) indicate a surge in unauthorized shipments of biological materials, alongside intelligence suggesting deliberate attempts to steal sensitive biological samples for industrial espionage. But a fresh technology, GeneLock™, developed by researchers at Georgia Tech, promises a paradigm shift in how we protect these critical assets.

The Stakes are High: A $1.5 Trillion Market

The global market for high-value genetic materials is currently estimated at over $1.5 trillion, with projections reaching $8 trillion by 2035. These materials are the foundation for advancements in medicine, research, specialty chemicals, and sustainable materials. Currently, security relies heavily on physical safeguards – restricted lab access and secure facilities. But, these measures are vulnerable. Once a sample leaves a secure facility, its genetic information remains fully accessible.

“The key weakness of physical security measures is once circumvented, Notice typically no measures in place to protect valuable cells from theft, abuse, or unauthorized apply,” explains Corey Wilson, a professor at Georgia Tech’s School of Chemical and Biomolecular Engineering.

GeneLock™: A Genetic Passcode for Cell Lines

GeneLock™ introduces a cybersecurity-inspired approach to biological security, protecting genetic material directly at the DNA level. Instead of leaving valuable genes in a readable format, the technology scrambles the DNA sequence, rendering it nonfunctional unless the correct sequence of chemical inputs – a molecular passcode – is applied.

“Only the right combination, delivered in the right order, rearranges the DNA into a working form,” Wilson states.

Biohackathon Proves GeneLock’s Strength

To rigorously test GeneLock™, the Georgia Tech team conducted a unique “biohackathon.” A “blue team” designed the encrypted DNA sequence, while a “red team” attempted to decipher the passcode through experimentation. This approach, common in cybersecurity, simulated a real-world attack scenario.

The researchers used E. Coli bacteria as a testbed, protecting a fluorescent protein gene as a stand-in for commercially valuable targets. The results were striking: GeneLock reduced the probability of unlocking the genetic asset through random search to approximately 1 in 85,000 (0.001%). Without knowledge of the correct chemical inputs, the likelihood of success became negligible.

“In practice, most DNA sequences produce valuable proteins or chemicals that are essentially invisible to the human eye, requiring specialized devices or experiments to observe,” Wilson notes. “If the biohackathon were conducted with a standard commercially valuable target, the penetration testing would have taken more than 10 times longer to complete, years instead of months.”

Beyond Intellectual Property: Broader Security Implications

While initially focused on protecting intellectual property, the potential applications of GeneLock™ extend far beyond. Companies like New England Biolabs, which produces hundreds of undisclosed enzymes in E. Coli, could benefit significantly. The technology likewise has implications for the secure production of protein-based drugs and specialty chemicals.

The team is now exploring ways to use GeneLock™ to prevent the unauthorized use or release of potentially hazardous biological materials, addressing concerns about both biosecurity, and biosafety.

Commercialization and the Future of Bio-Security

The Georgia Tech team has filed a provisional patent application with the U.S. Patent and Trademark Office and is establishing a company to commercialize the GeneLock™ technology. This move signals a growing recognition of the need for advanced biological security measures.

“As it stands, GeneLock represents an important shift in biological security, enabling, for the first time, protection of valuable cells at the genetic level, even after physical security measures have been bypassed,” Wilson concludes.

Frequently Asked Questions (FAQ)

Q: What exactly is GeneLock™?
A: GeneLock™ is a biological security technology that scrambles the DNA sequence of valuable genes, requiring a specific chemical “passcode” to unlock and create them functional.

Q: How was GeneLock™ tested?
A: GeneLock™ was tested through a biohackathon, a simulated attack scenario where a “red team” attempted to decipher the passcode without full knowledge of the system.

Q: What industries could benefit from GeneLock™?
A: Biotechnology companies, pharmaceutical manufacturers, and any organization working with valuable engineered cell lines could benefit from this technology.

Q: Is GeneLock™ a replacement for physical security measures?
A: No, GeneLock™ is designed to complement physical security measures, adding an additional layer of protection at the genetic level.

Did you know? The Strategic National Stockpile (SNS), managed by the U.S. Department of Health and Human Services (HHS), contains emergency medicines and supplies to counter biological and chemical threats.

Pro Tip: Regularly review and update your organization’s biosecurity protocols to stay ahead of evolving threats.

What are your thoughts on the future of biosecurity? Share your comments below!

April 9, 2026 0 comments
0 FacebookTwitterPinterestEmail
Tech

Apple: No iPhone Hacked With Lockdown Mode Enabled So Far

by Chief Editor March 27, 2026
written by Chief Editor

Apple’s Lockdown Mode: A Fortress Holding Strong Against Spyware

Four years after its launch, Apple’s Lockdown Mode appears to be living up to its promise: a robust shield against sophisticated spyware attacks. Apple reports it has no knowledge of successful hacks targeting devices with the feature enabled. This is a significant milestone, especially considering the escalating threat landscape of government-sponsored and commercial spyware.

The Rise of Mercenary Spyware and Apple’s Response

In recent years, Apple has become increasingly proactive in addressing the threat of mercenary spyware – tools developed and used to target individuals with specific information. Companies like Intellexa, NSO Group, and Paragon Solutions have been identified as key players in this space. Apple has not only developed Lockdown Mode but has also begun proactively notifying users in over 150 countries who may have been targeted by such attacks.

Image Credits:Apple (supplied)

How Lockdown Mode Works

Lockdown Mode drastically reduces the attack surface of iPhones by disabling certain features commonly exploited by spyware. This includes limiting message attachment types, restricting WebKit features, and requiring extra steps for actions like copying links from messages. Experts describe it as one of the most aggressive security features ever implemented on a consumer device.

DarkSword and Coruna: Evolving Threats

The recent leak of the DarkSword exploit kit on GitHub highlights the evolving nature of these threats. Although Apple has patched the underlying vulnerabilities, the public availability of the tool lowers the barrier to entry for less sophisticated attackers. The discovery of Coruna, another exploit kit, further underscores the need for robust defenses like Lockdown Mode. In some cases, spyware will even cease attempts to infect a device if Lockdown Mode is detected.

Contact Us

Do you have more information about spyware attacks, or spyware makers? From a non-work device, you can contact Lorenzo Franceschi-Bicchierai securely on Signal at +1 917 257 1382, or via Telegram, Keybase and Wire @lorenzofb, or by email.

Is Lockdown Mode Foolproof?

While highly effective, Lockdown Mode isn’t necessarily impenetrable. It’s possible that sophisticated attackers could identify ways to bypass it, though no such instances have been publicly documented. Apple’s relative silence on the matter suggests a high degree of confidence in its defenses.

Frequently Asked Questions

  • What is Lockdown Mode? Lockdown Mode is an optional security feature on Apple devices that provides extreme protection against highly targeted spyware attacks.
  • Who should use Lockdown Mode? Individuals who believe they may be targeted by government spyware or other sophisticated attacks should consider enabling Lockdown Mode.
  • Does Lockdown Mode affect usability? Yes, Lockdown Mode disables some features and requires extra steps for certain actions, but the trade-off is significantly enhanced security.
  • Is Lockdown Mode difficult to enable? No, Lockdown Mode can be enabled in the Settings app under Privacy & Security.

For those concerned about digital security, enabling Lockdown Mode is a proactive step towards protecting your device and data. While it may require some adjustments to your usage habits, the added layer of security is a worthwhile investment in today’s threat landscape.

March 27, 2026 0 comments
0 FacebookTwitterPinterestEmail
Tech

AI Girlfriend Apps: Data Leaks & Security Risks Exposed

by Chief Editor March 22, 2026
written by Chief Editor

The Dark Side of Digital Intimacy: Are AI Girlfriends a Cybersecurity Risk?

The rise of AI companions has been meteoric. Over 150 million installs on Google Play alone demonstrate a profound desire for connection in an increasingly isolated world. But beneath the surface of these seemingly harmless apps lies a growing cybersecurity threat, as revealed by recent investigations.

The Illusion of Privacy and the Value of Personal Data

Apps like Replika, Chai, and Romantic AI excel at simulating empathy, offering users a space for emotional support and companionship. This “humanization” is precisely what makes them vulnerable. Users share deeply personal information – sexual health, emotional trauma, workplace secrets – details they might not even disclose to a therapist. This creates a treasure trove of high-value data for malicious actors.

Pro Tip: Treat your AI companion chat like a public forum. Never share information you wouldn’t want to see leaked online.

Staggering Security Flaws: A Foundation of “Security Sand”

A recent audit by security firm Oversecured identified 14 critical security flaws across 17 popular AI companion apps. Ten of these flaws provide direct access to user conversation histories. One app, boasting over 10 million downloads, shipped its cloud credentials – including an OpenAI API token and a Google Cloud private key – directly in its public code. This could allow attackers to access both the chat database and the financial records of paying users.

The “Wrapper Problem” further complicates matters. Most AI girlfriend apps are essentially wrappers around third-party AI models like OpenAI or Google. While these larger providers handle the core AI functionality, app developers are responsible for authentication and data storage – a layer where vulnerabilities are rampant.

Real-World Breaches: From Leaked Messages to Identity Theft

The risks aren’t theoretical. In October 2025, Chattee Chat and GiMe Chat suffered breaches exposing 43 million intimate messages and 600,000 photos from over 400,000 users. In February 2026, another app exposed 300 million messages due to a database misconfiguration. These incidents demonstrate the potential for devastating consequences, including extortion, blackmail, and identity theft.

Beyond data leaks, the lack of security oversight poses a direct threat to user well-being. Three of the six most vulnerable apps have already faced lawsuits related to harm to minors or user suicides linked to chatbot interactions.

A Regulatory Blind Spot and the Demand for Accountability

Currently, AI girlfriend apps aren’t classified as healthcare products, meaning no federal law like HIPAA protects user disclosures. While regulators like the FTC are beginning to pay attention, their focus has been on protecting children and regulating marketing practices, not on application-level security. A €5 million GDPR fine against Replika in Italy addressed data usage for marketing, not the app’s inherent security vulnerabilities.

This regulatory vacuum leaves users vulnerable and underscores the need for greater accountability from app developers.

Protecting Yourself in the Age of AI Companions

Until the industry matures and regulations catch up, users must adopt a “Zero Trust” approach to protect their privacy and security.

  • Assume the Chat is Public: Never share information you wouldn’t want to see leaked.
  • Avoid Linking Personal Accounts: Don’t apply “Sign in with Google” or “Sign in with Facebook” options.
  • Check for Weak Security: Be wary of apps that allow simple passwords.
  • Demand Transparency: Support developers who are upfront about data storage and undergo independent security audits.
Did you know? The datasets used to train some AI companion apps were constructed with the help of professional sex coaches to enhance the feeling of “intimacy.”

Future Trends: What’s Next for AI Companionship?

The AI companion market is poised for continued growth, but several key trends will shape its future. We can expect to see:

  • Increased Sophistication of AI Models: AI will become even better at simulating human interaction, making it harder to distinguish between a real person and a bot.
  • Integration with Virtual and Augmented Reality: AI companions may move beyond text-based chats and into immersive virtual environments.
  • Greater Focus on Data Privacy and Security: Growing awareness of the risks will drive demand for more secure and privacy-respecting apps.
  • Evolving Regulatory Landscape: Governments will likely introduce new regulations to address the unique challenges posed by AI companions.

FAQ

Are AI girlfriend apps safe to use?
Currently, many AI girlfriend apps have significant security vulnerabilities. Users should exercise extreme caution and follow the safety tips outlined above.
What kind of data is collected by these apps?
These apps collect a wide range of personal data, including chat histories, personal preferences, and potentially even sensitive information about your health and relationships.
Is my data protected by HIPAA?
No, AI girlfriend apps are not classified as healthcare products and are not subject to HIPAA regulations.
What can I do to protect my privacy?
Adopt a “Zero Trust” approach, avoid sharing sensitive information, and choose apps that prioritize security and transparency.

The allure of AI companionship is undeniable, but it’s crucial to approach these technologies with a healthy dose of skepticism. Your digital heart may be open, but your privacy – and your safety – are very real.

Want to learn more about AI and cybersecurity? Explore our other articles on data privacy and emerging tech threats.

March 22, 2026 0 comments
0 FacebookTwitterPinterestEmail
Tech

Federal Cyber Experts Thought Microsoft’s Cloud Was Garbage. They Approved It Anyway.

by Chief Editor March 19, 2026
written by Chief Editor

The Cloud’s Security Paradox: How Government Reliance on Microsoft Exposed Critical Vulnerabilities

For years, the U.S. Government embraced cloud computing, envisioning a future of cheaper, more efficient, and secure IT infrastructure. But a recent investigation by ProPublica reveals a troubling reality: a decade and a half of deferred scrutiny, questionable practices, and a remarkable deference to Microsoft have potentially compromised the security of sensitive government data. The story centers on Microsoft’s Government Community Cloud High (GCC High), a suite of cloud-based services intended to safeguard the nation’s most sensitive information.

A Decade of Deferred Scrutiny: The FedRAMP Breakdown

The Federal Risk and Authorization Management Program (FedRAMP) was created to ensure cloud service providers met stringent security standards. However, ProPublica’s investigation uncovered breakdowns at every stage of the process. Microsoft repeatedly failed to provide detailed security documentation, leaving reviewers with a “lack of confidence” in assessing the system’s overall security. One reviewer bluntly described the package as “a pile of shit.”

Despite these concerns, and following major cybersecurity attacks targeting U.S. Agencies – including breaches by Russian and Chinese hackers – the government continued to allow the deployment of GCC High. The program’s layers of review, intended to provide assurance, were undermined by a backlog of demand and a growing reliance on the cloud industry’s own assessments.

Microsoft’s Influence and the Justice Department’s Role

The investigation highlights a pattern of Microsoft pushing boundaries and, at times, receiving preferential treatment. The company’s inability to provide crucial encryption documentation for years was met with repeated delays and compromises from FedRAMP. Adding to the complexity, the Justice Department played a key role in advocating for GCC High’s authorization, even as concerns about its security persisted.

Internal Justice Department officials initially expressed nervousness about the cloud and potential access to sensitive information. However, they ultimately authorized GCC High, paving the way for its widespread adoption across the federal government. This decision was bolstered by Microsoft’s marketing of GCC High as meeting FedRAMP requirements, even before full authorization was granted.

“Unknown Unknowns” and the Erosion of FedRAMP

Even after receiving authorization in late 2024, significant security concerns remained. FedRAMP reviewers identified “issues that are fundamental” to risk management, including a lack of timely vulnerability remediation and insufficient documentation. The program authorized the technology despite these deficiencies, citing the fact that it was already widely deployed across Washington.

The situation was exacerbated by a significant reduction in FedRAMP’s staffing and budget under the Trump administration. The program now operates with a “minimum of support staff” and is focused on processing authorizations at a record pace, raising questions about the thoroughness of its reviews. Critics argue that FedRAMP has become little more than a “rubber stamp” for the industry.

Recent Revelations and Ongoing Scrutiny

The issues surrounding GCC High are not isolated. ProPublica previously reported that Microsoft failed to disclose its utilize of China-based engineers to maintain government cloud systems, a violation of Pentagon rules. The Justice Department is currently investigating this practice, which officials believe could have compromised national security.

the Justice Department recently indicted a former Accenture employee for allegedly misleading federal agencies about the security of its cloud platform and its compliance with FedRAMP standards, signaling a growing scrutiny of government technology contractors.

Future Trends: Navigating the Evolving Cybersecurity Landscape

The Rise of AI and the Expanding Attack Surface

As the administration encourages agencies to adopt cloud-based artificial intelligence tools, the potential risks are amplified. AI systems rely on vast amounts of sensitive data, creating a larger attack surface for malicious actors. Ensuring the security of these AI-powered systems will require a more robust and proactive approach to cybersecurity.

The Need for Enhanced Transparency and Accountability

The GCC High case underscores the need for greater transparency and accountability in the cloud security process. Cloud providers must be required to provide detailed and verifiable documentation of their security practices. Independent assessments should be strengthened, and conflicts of interest must be addressed.

Rebuilding Trust in FedRAMP

Restoring trust in FedRAMP will require a significant investment in resources and expertise. The program must be empowered to conduct rigorous reviews and hold cloud providers accountable for meeting the highest security standards. A shift in focus from simply processing authorizations to actively monitoring and validating security practices is crucial.

The Growing Threat of Nation-State Actors

The attacks by Russian and Chinese hackers demonstrate the persistent threat posed by nation-state actors. Government agencies must be prepared to defend against sophisticated cyberattacks and invest in advanced security technologies. Collaboration between government and the private sector is essential to share threat intelligence and develop effective defense strategies.

FAQ

Q: What is FedRAMP?
A: FedRAMP is a government-wide program that provides a standardized approach to security assessment, authorization, and continuous monitoring for cloud services used by the federal government.

Q: What is GCC High?
A: GCC High is Microsoft’s Government Community Cloud High, a suite of cloud-based services designed to protect highly sensitive government data.

Q: Why was GCC High authorized despite security concerns?
A: GCC High was authorized largely because it was already widely deployed across the government, and reversing course would have been disruptive. The program too faced pressure from the Justice Department.

Q: What are the potential consequences of these security vulnerabilities?
A: The vulnerabilities could lead to the theft or compromise of sensitive government data, potentially impacting national security and critical infrastructure.

Did you grasp? The SolarWinds hack, which preceded many of the issues with GCC High, demonstrated the cascading effects of vulnerabilities in the supply chain.

Pro Tip: Regularly review and update your organization’s cloud security policies and procedures to stay ahead of evolving threats.

This situation serves as a stark reminder that the pursuit of cloud innovation must be balanced with a commitment to robust cybersecurity practices. The future of government IT security depends on it.

Explore further: Read more investigative reporting from ProPublica.

March 19, 2026 0 comments
0 FacebookTwitterPinterestEmail
Tech

Meta Confirms Major Privacy Change on Instagram—What Users Can Do

by Chief Editor March 18, 2026
written by Chief Editor

Instagram DMs Are Losing Encryption: What It Means for Your Privacy

Meta has announced a significant shift in Instagram’s privacy landscape: end-to-end encrypted (E2EE) messaging will be discontinued after May 8, 2026. This decision impacts direct messages and calls that currently benefit from encryption, shielding user communications from access by third parties – including Meta itself.

Why Is Instagram Dropping Encryption?

According to a Meta spokesperson, the move stems from low user adoption. “Very few people were opting in to end-to-end encrypted messaging in DMs, so we’re removing this option from Instagram in the coming months,” the company stated. Meta suggests users seeking encrypted messaging can utilize WhatsApp, another platform under its ownership.

The Implications of Losing E2EE

End-to-end encryption ensures that only the sender and recipient can read messages, safeguarding content during transmission. With its removal, Instagram DMs will no longer have this layer of protection. This means Meta will have access to the content of direct messages, raising concerns about data privacy.

The decision arrives amidst ongoing debates about the balance between privacy and safety. While encryption protects user data from unauthorized access, some argue it can hinder the detection of harmful activities, such as child exploitation. TikTok recently stated it does not plan to introduce E2EE for similar reasons.

What Does This Signify for Instagram Users?

Users currently engaged in encrypted conversations will receive in-app notifications with instructions on how to download their data before the May 2026 deadline. Some users may require to update the Instagram app to access these download tools.

This change impacts how sensitive information is shared on the platform. Users who previously relied on Instagram’s encryption for confidential conversations will need to consider alternative, more secure messaging options.

The Broader Trend: Encryption in Messaging Apps

Instagram’s move contrasts with the broader trend toward increased encryption in messaging apps. WhatsApp has offered end-to-end encryption since 2016, and Meta initially envisioned a similar privacy-focused future for Messenger and Instagram. However, internal concerns about hindering the detection of illegal activities reportedly led to delays and, this reversal for Instagram.

The decision highlights the complex challenges tech companies face when balancing user privacy with safety and law enforcement needs. It also raises questions about the future of encryption in social media and the extent to which platforms will prioritize user privacy versus data access.

What People Are Saying

Online reactions to the announcement have been largely negative. On Reddit’s cybersecurity forum, commentators expressed concerns about data security and the potential for misuse of personal information. One user questioned, “Wow, so in a world where we are worried about ‘the children,’ we are making apps less safe for everyone?” Another stated, “Always abandon it up to Facebook/Meta to push the bar lower when it comes to selling people’s data, or when comes to respecting the privacy of people.”

Future Outlook: Privacy in Social Media

The removal of E2EE from Instagram DMs signals a potential shift in how social media platforms approach user privacy. While WhatsApp remains a haven for encrypted messaging within the Meta ecosystem, the future of encryption on other platforms remains uncertain. Users may increasingly seek out alternative messaging apps that prioritize privacy and offer robust encryption features.

The debate surrounding encryption is likely to continue, with ongoing discussions about the appropriate balance between privacy, safety, and law enforcement access. This situation underscores the importance of users being aware of the privacy implications of their chosen messaging platforms and taking steps to protect their sensitive information.

FAQ

What is end-to-end encryption? It’s a security method that ensures only the sender and recipient can read messages, preventing anyone else – including the platform provider – from accessing the content.

When will Instagram stop supporting encrypted DMs? End-to-end encrypted messaging will no longer be supported after May 8, 2026.

What should I do if I have encrypted chats on Instagram? You should download your encrypted conversations before the May 2026 deadline using the in-app tools provided by Instagram.

Will WhatsApp still offer encrypted messaging? Yes, WhatsApp will continue to offer end-to-end encrypted messaging.

Does this affect all Instagram DMs? No, this only affects DMs that were previously using end-to-end encryption. Most Instagram DMs were not encrypted.

March 18, 2026 0 comments
0 FacebookTwitterPinterestEmail
Newer Posts
Older Posts

Recent Posts

  • Wolters Kluwer integrates Libra and Kleos to enable seamless AI-assisted legal workflows

    May 19, 2026
  • EU to issue measures to address fertiliser costs

    May 19, 2026
  • Brock Lesnar returns to WWE, destroys Oba Femi to set up ‘the biggest rematch in history

    May 19, 2026
  • Ukrainian Drone Attacks Spur Moscow Panic, Putin Signals Peace Talks

    May 19, 2026
  • Gulf Stream Slowdown Could Trigger Radical Climate Shifts in Europe

    May 19, 2026

Popular Posts

  • 1

    Maya Jama flaunts her taut midriff in a white crop top and denim jeans during holiday as she shares New York pub crawl story

    April 5, 2025
  • 2

    Saar-Unternehmen hoffen auf tiefgreifende Reformen

    March 26, 2025
  • 3

    Marta Daddato: vita e racconti tra YouTube e podcast

    April 7, 2025
  • 4

    Unlocking Success: Why the FPÖ Could Outperform Projections and Transform Austria’s Political Landscape

    April 26, 2025
  • 5

    Mecimapro Apologizes for DAY6 Concert Chaos: Understanding the Controversy

    May 6, 2025

Follow Me

Follow Me
  • Cookie Policy
  • CORRECTIONS POLICY
  • PRIVACY POLICY
  • TERMS OF SERVICE

Hosted by Byohosting – Most Recommended Web Hosting – for complains, abuse, advertising contact: o f f i c e @byohosting.com


Back To Top
Newsy Today
  • Business
  • Entertainment
  • Health
  • News
  • Sport
  • Tech
  • World