• Business
  • Entertainment
  • Health
  • News
  • Sport
  • Tech
  • World
Newsy Today
news of today
Home - infosec
Tag:

infosec

Tech

Barracuda spots 7 million device code phishing attacks

by Chief Editor April 24, 2026
written by Chief Editor

The Industrialization of Identity Theft: The PhaaS Evolution

The landscape of cybercrime is shifting from manual, targeted attacks to a highly scalable business model. The emergence of Phishing-as-a-Service (PhaaS) platforms, such as the EvilTokens kit, allows low-skill criminals to launch sophisticated campaigns that were once the sole domain of advanced threat actors.

This “industrialization” means that high-volume attacks are now easier to execute. For example, security firm Barracuda recently detected over 7 million device code phishing attacks within a single four-week window. By packaging complex exploits into ready-to-use kits sold on platforms like Telegram, the barrier to entry for attackers has vanished.

Did you recognize? Device code phishing is particularly dangerous since it doesn’t rely on fake login pages. Instead, it tricks users into using the legitimate Microsoft login portal, making it nearly invisible to traditional “spot the fake URL” training.

Beyond the Password: The Shift to Token Hijacking

For years, security training focused on preventing credential theft. However, we are seeing a strategic pivot toward hijacking trusted authentication flows. Instead of stealing a password, attackers are now targeting OAuth 2.0 access and refresh tokens.

View this post on Instagram about Microsoft, Phishing
From Instagram — related to Microsoft, Phishing

By abusing the device authorization flow—originally designed for devices with limited interfaces like printers or smart TVs—attackers can gain authorized access to Microsoft 365 and Entra ID environments. Once a victim enters a legitimate code on a real Microsoft page, the attacker receives the token directly.

This method provides three critical advantages for the attacker:

  • Stealth: No cloned websites are used, bypassing many email filters.
  • MFA Bypass: Because the victim authorizes the device themselves, multifactor authentication (MFA) and conditional access checks are often bypassed.
  • Persistence: Refresh tokens can grant attackers access for days or weeks, remaining effective even if the user changes their password.

The Next Frontier: Cross-Platform Expansion

While current surges heavily target Microsoft ecosystems, the trend is moving toward cross-platform versatility. The developers behind the EvilTokens kit have already indicated plans to extend their phishing capabilities to include Gmail and Okta phishing pages.

How fast is a BARRACUDA ATTACK? FREE CODE FRIDAY : DIGITAL CODES Magic Mike 7th son

This suggests a future where “identity-agnostic” phishing kits can pivot between different cloud providers depending on the target’s infrastructure. We are already seeing diverse threat actors—including Russian groups like Storm-237, UTA032, UTA0355, UNK_AcademicFlare, and TA2723, as well as the ShinyHunters data extortion group—leveraging these advanced techniques.

Pro Tip: To mitigate this risk, organizations should implement layered security controls, including advanced email filtering and continuous monitoring of identity protection mechanisms. Tighter controls around device authorization flows are essential to stop token abuse.

Redefining the Human Firewall

The rise of device code phishing renders traditional “look for the padlock” or “check the domain” advice obsolete. Since the final step of the attack happens on a genuine site (such as microsoft.com/devicelogin), the battle has shifted from technical detection to contextual awareness.

Future security training must move beyond identifying “fake” sites and instead teach users to question the reason for a request. If a user is asked to enter a verification code for a device they didn’t intentionally link, it should be treated as a critical red flag, regardless of how legitimate the website appears.

Attackers are increasingly tailoring their lures to specific roles. Recent campaigns have used PDFs, HTML, and DOCX files impersonating financial documents, payroll notices, or SharePoint shares to target employees in HR, finance, logistics, and sales.

Frequently Asked Questions

What is device code phishing?
It’s an attack that abuses the OAuth 2.0 device authorization flow. Attackers trick users into entering a legitimate device code on an official login page, which grants the attacker an access token to the user’s account.

Can MFA stop device code phishing?
Not necessarily. Because the victim is the one performing the authentication on a trusted device, they effectively “approve” the attacker’s session, potentially bypassing MFA and conditional access checks.

What is EvilTokens?
EvilTokens is a Phishing-as-a-Service (PhaaS) kit that automates device code phishing attacks, primarily targeting Microsoft 365 and Entra ID environments.

How do I protect my organization?
Implement layered security, use advanced email filtering, monitor for unusual identity patterns, and train staff to never enter device codes unless they initiated the request themselves.


Are you confident in your current identity protection strategy? Share your thoughts in the comments below or subscribe to our newsletter for the latest updates on evolving cyber threats.

April 24, 2026 0 comments
0 FacebookTwitterPinterestEmail
Tech

Hackers are abusing unpatched Windows security flaws to hack into organizations

by Chief Editor April 17, 2026
written by Chief Editor

The High-Stakes Game of Full Disclosure

The tension between independent security researchers and software giants is reaching a breaking point. Traditionally, the industry relies on “coordinated vulnerability disclosure,” where a researcher reports a flaw privately to a company, allowing them to patch it before the public finds out.

View this post on Instagram about Microsoft, Full
From Instagram — related to Microsoft, Full

However, we are seeing a rise in “full disclosure.” This occurs when communication breaks down—often due to conflicts with entities like Microsoft’s Security Response Center (MSRC)—and researchers publish the vulnerability details and “proof-of-concept” (PoC) code openly on platforms like GitHub or personal blogs.

While researchers may leverage this tactic to prove the severity of a flaw or pressure a vendor into action, it creates a dangerous window of opportunity. When PoC code is published, it essentially provides a blueprint for cybercriminals and government hackers to launch attacks before a patch is even available.

Did you grasp? “Full disclosure” can turn a hidden flaw into “ready-made attacker tooling,” significantly shortening the time it takes for a vulnerability to be weaponized in the wild.

From PoC to Weapon: The Speed of Modern Exploits

The window between a vulnerability being disclosed and its active exploitation is shrinking. Recent activity involving the researcher known as Chaotic Eclipse (or Nightmare-Eclipse) illustrates this acceleration.

For instance, the BlueHammer exploit was published as a PoC on April 3, and by April 10, it was already being observed in the wild. Even more alarming was the release of the RedSun and UnDefend exploits on April 16, which were observed being used by threat actors on the very same day.

This trend suggests that threat actors are now monitoring researcher repositories in real-time. Once code is uploaded to GitHub, it is almost immediately integrated into attack chains, often following typical enumeration commands like whoami /priv and net group to identify system privileges.

As John Hammond of Huntress notes, this creates a constant “tug-of-war” where defenders must frantically race against adversaries who are using pre-made tools to breach organizations.

Targeting the Guardians: Why Security Software is the New Front Line

A critical trend in modern cyberattacks is the targeting of the security software itself. Instead of trying to bypass an antivirus, hackers are finding ways to exploit it to gain higher privileges or disable it entirely.

1 Billion PCs Vulnerable: The Unpatched "BlueHammer" Windows 0-Day #cybersecurity #vulnerability

The recent exploitation of Microsoft Defender highlights two dangerous techniques:

  • Local Privilege Escalation (LPE): Vulnerabilities like BlueHammer (CVE-2026-33825) and RedSun allow attackers to gain administrator or high-level access to a compromised system.
  • Denial-of-Service (DoS) for Defense: The UnDefend vulnerability allows a standard user to block Microsoft Defender from receiving critical signature updates or disable the software completely.

By neutralizing the “guardian” of the system, attackers can operate with much higher stealth, ensuring that their subsequent malicious activities go undetected by the very tools meant to stop them.

Pro Tip: To mitigate the risk of LPE and DoS attacks on security software, ensure your systems are updated immediately during Patch Tuesday cycles. Even when some flaws remain unpatched, applying available fixes for known CVEs like CVE-2026-33825 reduces the overall attack surface.

FAQ: Understanding Modern Zero-Day Trends

What is a zero-day vulnerability?

A zero-day is a security flaw that is known to the discoverer (and potentially attackers) but is unknown to the software vendor, meaning the vendor has “zero days” to fix it before it can be exploited.

FAQ: Understanding Modern Zero-Day Trends
Microsoft Microsoft Defender Defender

What is the difference between a PoC and a weaponized exploit?

A Proof-of-Concept (PoC) is code designed to demonstrate that a vulnerability exists. A weaponized exploit is a refined version of that code, optimized by attackers to reliably breach systems, evade detection, and deliver a malicious payload.

Why would a researcher publish a flaw before it is patched?

Researchers may resort to full disclosure if they experience the vendor is ignoring the report, downplaying the severity of the risk, or if the coordinated disclosure process has failed.

For more insights into endpoint security and vulnerability management, explore our security guides or read about recent Microsoft Defender threats.

Join the Conversation: Do you think “full disclosure” is a necessary evil to force vendors to patch faster, or does it do more harm than good? Let us know in the comments below or subscribe to our newsletter for the latest in cybersecurity trends.

April 17, 2026 0 comments
0 FacebookTwitterPinterestEmail
Tech

Apple: No iPhone Hacked With Lockdown Mode Enabled So Far

by Chief Editor March 27, 2026
written by Chief Editor

Apple’s Lockdown Mode: A Fortress Holding Strong Against Spyware

Four years after its launch, Apple’s Lockdown Mode appears to be living up to its promise: a robust shield against sophisticated spyware attacks. Apple reports it has no knowledge of successful hacks targeting devices with the feature enabled. This is a significant milestone, especially considering the escalating threat landscape of government-sponsored and commercial spyware.

The Rise of Mercenary Spyware and Apple’s Response

In recent years, Apple has become increasingly proactive in addressing the threat of mercenary spyware – tools developed and used to target individuals with specific information. Companies like Intellexa, NSO Group, and Paragon Solutions have been identified as key players in this space. Apple has not only developed Lockdown Mode but has also begun proactively notifying users in over 150 countries who may have been targeted by such attacks.

Image Credits:Apple (supplied)

How Lockdown Mode Works

Lockdown Mode drastically reduces the attack surface of iPhones by disabling certain features commonly exploited by spyware. This includes limiting message attachment types, restricting WebKit features, and requiring extra steps for actions like copying links from messages. Experts describe it as one of the most aggressive security features ever implemented on a consumer device.

DarkSword and Coruna: Evolving Threats

The recent leak of the DarkSword exploit kit on GitHub highlights the evolving nature of these threats. Although Apple has patched the underlying vulnerabilities, the public availability of the tool lowers the barrier to entry for less sophisticated attackers. The discovery of Coruna, another exploit kit, further underscores the need for robust defenses like Lockdown Mode. In some cases, spyware will even cease attempts to infect a device if Lockdown Mode is detected.

Contact Us

Do you have more information about spyware attacks, or spyware makers? From a non-work device, you can contact Lorenzo Franceschi-Bicchierai securely on Signal at +1 917 257 1382, or via Telegram, Keybase and Wire @lorenzofb, or by email.

Is Lockdown Mode Foolproof?

While highly effective, Lockdown Mode isn’t necessarily impenetrable. It’s possible that sophisticated attackers could identify ways to bypass it, though no such instances have been publicly documented. Apple’s relative silence on the matter suggests a high degree of confidence in its defenses.

Frequently Asked Questions

  • What is Lockdown Mode? Lockdown Mode is an optional security feature on Apple devices that provides extreme protection against highly targeted spyware attacks.
  • Who should use Lockdown Mode? Individuals who believe they may be targeted by government spyware or other sophisticated attacks should consider enabling Lockdown Mode.
  • Does Lockdown Mode affect usability? Yes, Lockdown Mode disables some features and requires extra steps for certain actions, but the trade-off is significantly enhanced security.
  • Is Lockdown Mode difficult to enable? No, Lockdown Mode can be enabled in the Settings app under Privacy & Security.

For those concerned about digital security, enabling Lockdown Mode is a proactive step towards protecting your device and data. While it may require some adjustments to your usage habits, the added layer of security is a worthwhile investment in today’s threat landscape.

March 27, 2026 0 comments
0 FacebookTwitterPinterestEmail
Tech

Microsoft patches major SQL Server flaw in March update

by Chief Editor March 13, 2026
written by Chief Editor

March 2026 Patch Tuesday: A Deep Dive into Microsoft’s Latest Security Updates

Microsoft’s March 2026 Patch Tuesday addressed a substantial 77 security vulnerabilities across its product suite, with a notable focus on SQL Server. This release included fixes for two zero-day vulnerabilities that were publicly known before patches were available, though currently, there’s no evidence of widespread exploitation.

SQL Server Under Scrutiny: CVE-2026-21262

The most critical update centers around CVE-2026-21262, an elevation-of-privilege vulnerability impacting a wide range of SQL Server versions, from the latest 2025 release all the way back to SQL Server 2016 Service Pack 3. While the vulnerability has a CVSS v3 base score of 8.8 – just shy of “critical” – the potential impact is significant. An attacker with low-level privileges could potentially escalate to sysadmin-level rights over the database engine across a network.

According to Rapid7’s Lead Software Engineer, Adam Barnett, this isn’t a typical SQL Server patch. The ability to gain sysadmin access over a network is a serious concern. Despite Microsoft rating exploitation as less likely, the public disclosure of the vulnerability increases the urgency for administrators to apply the patch.

Even organizations that don’t directly expose SQL Server to the internet are at risk. Internet scanning reveals a considerable number of accessible SQL Server instances, amplifying the potential impact should reliable exploits emerge. Successful exploitation could allow attackers to access or alter data and potentially pivot to the underlying operating system using features like xp_cmdshell, which, while disabled by default, can be re-enabled by a sysadmin.

.NET Denial-of-Service Vulnerability (CVE-2026-26127)

Another key vulnerability addressed this month is CVE-2026-26127, affecting .NET applications and potentially leading to denial-of-service (DoS) conditions. Public disclosure of this vulnerability has also occurred. Exploitation could cause service crashes, creating brief windows where monitoring and security tools are offline, potentially allowing attackers to evade detection.

Repeated exploitation, even by less sophisticated attackers, could disrupt online services and lead to breaches of service-level agreements.

Authenticator App Vulnerability (CVE-2026-26123)

Microsoft also patched a vulnerability in the Microsoft Authenticator mobile app for iOS and Android (CVE-2026-26123). This flaw, related to custom URL schemes and improper authorisation, could allow a malicious app to impersonate Microsoft Authenticator and intercept authentication information, potentially leading to account compromise. While requiring user interaction – specifically, choosing a malicious app to handle the sign-in flow – Microsoft considers this an important vulnerability.

Organizations managing mobile devices should review app installation policies and default handler settings for authentication apps to restrict potentially harmful sign-in flows.

End of Life for SQL Server 2012 Parallel Data Warehouse

Beyond security patches, Microsoft announced the end of extended support for SQL Server 2012 Parallel Data Warehouse at the end of March. Customers continuing to use this platform will no longer receive security updates, leaving them vulnerable to potential exploits.

Future Trends in Vulnerability Management

These updates highlight several emerging trends in vulnerability management. The increasing speed of public disclosure before patches are available is a major concern. Attackers are actively scanning for vulnerabilities and sharing information, reducing the window of opportunity for defenders. This necessitates a shift towards proactive threat hunting and robust intrusion detection systems.

The focus on vulnerabilities in authentication mechanisms, like the Microsoft Authenticator app, underscores the growing importance of securing identity and access management (IAM) systems. Multi-factor authentication is becoming increasingly prevalent, making these applications prime targets for attackers.

The continued patching of older SQL Server versions, even those nearing end-of-life, demonstrates the long-tail challenge of maintaining security in complex environments. Organizations must prioritize patching critical vulnerabilities across all systems, regardless of age, and consider implementing compensating controls where patching is not immediately feasible.

Did you know?

Publicly disclosed vulnerabilities, even without known exploits, significantly increase the risk of attack. Attackers actively monitor vulnerability databases and security blogs for new disclosures.

FAQ

Q: What is Patch Tuesday?
A: Patch Tuesday is the unofficial name for the regular schedule when Microsoft releases security updates for its products.

Q: What is a zero-day vulnerability?
A: A zero-day vulnerability is a flaw that is unknown to the vendor and for which no patch is available, giving attackers a window of opportunity to exploit it.

Q: What is the CVSS score?
A: The Common Vulnerability Scoring System (CVSS) is an industry standard for assessing the severity of software vulnerabilities.

Q: Should I patch all vulnerabilities immediately?
A: Prioritize patching based on the severity of the vulnerability, the potential impact to your organization, and the availability of exploits.

Q: What is xp_cmdshell?
A: xp_cmdshell is a stored procedure in SQL Server that allows execution of operating system commands.

Pro Tip: Regularly scan your network for vulnerable systems and prioritize patching based on risk assessment.

Stay informed about the latest security threats and updates by subscribing to security advisories and following reputable security blogs. Proactive vulnerability management is essential for protecting your organization from cyberattacks.

March 13, 2026 0 comments
0 FacebookTwitterPinterestEmail
Tech

Shadow AI assistant Clawdbot raises workplace risks

by Chief Editor January 29, 2026
written by Chief Editor

The Rise of ‘Shadow AI’: How Unsanctioned Tools Like Clawdbot Are Reshaping Corporate Security

A recent report from Token Security Labs has revealed a startling trend: employees are increasingly adopting personal AI assistants – often without IT’s knowledge. Their analysis found Clawdbot (also known as Moltbot) is currently active within 22% of their customer organizations. This isn’t an isolated incident; it’s a symptom of a larger shift towards “shadow AI,” where powerful AI tools operate outside traditional security perimeters.

What is ‘Shadow AI’ and Why is it a Problem?

Shadow AI refers to the use of AI applications and services within an organization that haven’t been vetted or approved by the IT or security teams. Clawdbot, a locally-run AI assistant connecting to popular messaging apps like Slack, WhatsApp, and Microsoft Teams, exemplifies this. While offering convenience – calendar management, email responses, file access – it introduces significant risks. The core issue? Broad access to sensitive data coupled with lax security practices.

Consider this scenario: an employee uses Clawdbot on their personal laptop, connecting it to corporate Slack. Suddenly, confidential internal discussions, files, and even credentials are potentially accessible outside the company’s secure network. This bypasses crucial data loss prevention (DLP) controls and audit trails, making it difficult to detect and respond to breaches.

Did you know? A 2023 Gartner report estimated that 30% of organizations will experience “shadow IT” related security incidents by 2024, and AI tools are rapidly becoming a major component of this risk.

The Security Risks: Plaintext Credentials and Exposed APIs

Token Security’s investigation uncovered alarming security vulnerabilities. Clawdbot stores credentials in plaintext, meaning anyone with access to the user’s device can easily view them. Furthermore, researchers like Jamieson O’Reilly have discovered hundreds of publicly accessible Clawdbot instances with open admin dashboards, exposing API keys, OAuth tokens, and conversation histories. In some cases, remote code execution was even possible.

The lack of default sandboxing – explicitly acknowledged in Clawdbot’s documentation – further exacerbates the problem. This means the AI assistant operates with significant system access, increasing the potential damage from a successful attack. Prompt injection, where malicious instructions are embedded within seemingly harmless inputs, also poses a threat when the tool processes emails, documents, and web pages.

Beyond Clawdbot: The Expanding Landscape of Personal AI

Clawdbot is just the tip of the iceberg. The proliferation of open-source Large Language Models (LLMs) and user-friendly interfaces is making it easier than ever for employees to deploy personal AI assistants. Tools like LM Studio and Ollama allow users to run powerful models locally, further blurring the lines between personal and corporate data.

This trend is fueled by a genuine desire for increased productivity. Employees are seeking ways to automate tasks, streamline workflows, and gain a competitive edge. However, without proper guidance and security measures, these efforts can inadvertently create significant vulnerabilities.

What Can Organizations Do? A Proactive Approach

Addressing the challenge of shadow AI requires a multi-faceted approach:

  • Discovery and Visibility: Monitor network traffic for patterns associated with AI assistant activity. Scan endpoints for the presence of directories like “.clawdbot”.
  • Permission and Access Control: Regularly review OAuth grants and API tokens connected to critical systems. Revoke unauthorized integrations.
  • Clear Policies: Establish clear policies regarding the use of personal AI agents, outlining acceptable use cases and security requirements.
  • Approved Alternatives: Provide employees with secure, enterprise-grade AI tools that offer the functionality they need while maintaining IT oversight.

Pro Tip: Implement a robust security awareness training program to educate employees about the risks associated with shadow AI and the importance of following security protocols.

The Future of AI Security: Zero Trust and Continuous Monitoring

Looking ahead, the rise of shadow AI will likely accelerate the adoption of zero-trust security models. This approach assumes that no user or device is inherently trustworthy and requires continuous verification before granting access to resources.

Continuous monitoring and threat detection will also become increasingly critical. Organizations will need to leverage AI-powered security tools to identify and respond to anomalous activity associated with shadow AI applications. The focus will shift from simply blocking these tools to understanding how they are being used and mitigating the associated risks.

Furthermore, expect to see increased collaboration between security vendors and AI developers to build more secure and responsible AI solutions. This includes incorporating privacy-preserving techniques, robust access controls, and comprehensive audit logging.

FAQ: Shadow AI and Your Organization

  • What is the biggest risk of shadow AI? The biggest risk is the potential for data breaches and unauthorized access to sensitive information due to lack of security controls and visibility.
  • How can I detect shadow AI in my organization? Monitor network traffic, scan endpoints, and review OAuth grants and API tokens.
  • Should I completely ban the use of personal AI assistants? A complete ban may not be practical or effective. Instead, focus on providing secure alternatives and establishing clear policies.
  • What is OAuth? OAuth (Open Authorization) is a standard protocol that allows users to grant third-party applications access to their data without sharing their passwords.

The emergence of shadow AI is a wake-up call for organizations. Ignoring this trend is not an option. By proactively addressing the risks and embracing a security-first approach, businesses can harness the power of AI while protecting their valuable assets.

Want to learn more about securing your organization against emerging AI threats? Explore our comprehensive security solutions or subscribe to our newsletter for the latest insights.

January 29, 2026 0 comments
0 FacebookTwitterPinterestEmail
Tech

Supreme Court hacker posted stolen government data on Instagram

by Chief Editor January 16, 2026
written by Chief Editor

Hacking Goes Public: The Rise of ‘Doxing’ and What It Means for Your Data

The recent guilty plea of Nicholas Moore, 24, to hacking U.S. government systems isn’t just about unauthorized access. It highlights a disturbing trend: hackers increasingly using stolen data for public shaming and intimidation – a practice known as ‘doxing.’ Moore’s case, involving breaches at the Supreme Court, AmeriCorps, and the Department of Veterans Affairs, and his subsequent posting of victims’ personal information on Instagram (@ihackthegovernment), is a stark warning of what’s to come.

The Anatomy of a Doxing Attack: From Credentials to Instagram

Moore’s method – leveraging stolen user credentials – is alarmingly common. Phishing attacks, password reuse, and weak security practices continue to provide hackers with easy access points. Once inside, the damage isn’t limited to data theft. As the court documents reveal, Moore didn’t just have the information; he actively published it. This escalation from data breach to public exposure significantly amplifies the harm to victims.

The details are chilling. For a Supreme Court employee (identified as GS), Moore exposed filing records. For an AmeriCorps worker (SM), he released a trove of personally identifiable information (PII) – name, address, date of birth, even the last four digits of their Social Security number. Perhaps most concerning, he shared a veteran’s (HW) private health information, including medication details, via a screenshot from their MyHealtheVet account.

Did you know? According to the Identity Theft Resource Center (ITRC), reports of data breaches increased by 78% between 2022 and 2023, with a significant portion involving the exposure of sensitive personal data. [ITRC Data Breach Statistics]

Why the Shift to Public Exposure? The Motivations Behind Doxing

Traditionally, stolen data was sold on the dark web. While that market still exists, several factors are driving the rise of doxing. First, it’s a form of ‘hacktivism’ – a way to publicly shame organizations or individuals the hacker disagrees with. Second, it’s about power and control. The act of exposing someone’s private life can be deeply traumatizing. Third, it can be a precursor to further attacks, like extortion or identity theft.

The Instagram element in Moore’s case is also noteworthy. Social media platforms provide a readily available audience and amplify the impact of the exposure. It’s a deliberate attempt to maximize the victim’s distress and generate attention for the hacker.

The Expanding Threat Landscape: Beyond Government Agencies

While Moore targeted government entities, the risk extends to businesses of all sizes and individuals. Healthcare organizations, financial institutions, and even schools are increasingly vulnerable. The HIPAA Journal regularly publishes statistics on healthcare data breaches, demonstrating the constant threat to patient privacy. Small businesses, often lacking robust cybersecurity measures, are particularly susceptible.

Pro Tip: Regularly check your online presence. Google yourself and see what information is publicly available. Consider using a privacy search engine like DuckDuckGo to see what data brokers have collected about you.

Future Trends: AI, Deepfakes, and the Weaponization of Personal Data

The future of doxing is likely to be even more sophisticated and dangerous. Artificial intelligence (AI) will play a significant role. AI-powered tools can automate the process of data collection and analysis, making it easier for hackers to identify and exploit vulnerabilities. Furthermore, the rise of deepfakes – realistic but fabricated videos and audio recordings – could be used to further damage a victim’s reputation.

We’re also likely to see an increase in the weaponization of personal data. Hackers may not just release information; they may manipulate it to create false narratives or engage in targeted disinformation campaigns. The line between doxing and cyberbullying will become increasingly blurred.

What Can You Do to Protect Yourself?

Protecting yourself requires a multi-layered approach:

  • Strong Passwords & MFA: Use strong, unique passwords for each account and enable multi-factor authentication (MFA) whenever possible.
  • Be Wary of Phishing: Be cautious of suspicious emails and links. Never click on anything you don’t trust.
  • Privacy Settings: Review and adjust the privacy settings on your social media accounts.
  • Data Breach Monitoring: Use a data breach monitoring service to alert you if your information has been compromised.
  • Cybersecurity Awareness Training: If you work for an organization, participate in cybersecurity awareness training.

FAQ: Doxing and Data Security

  • What is doxing? Doxing is the act of revealing someone’s personal information online, typically with malicious intent.
  • Is doxing illegal? Doxing can be illegal depending on the specific information revealed and the intent behind it. It can violate privacy laws and potentially lead to harassment or stalking.
  • What should I do if I’ve been doxed? Document the incident, report it to law enforcement, and contact the platforms where your information was posted.
  • How can I remove my personal information from the internet? It’s difficult to remove all your information, but you can request removal from data brokers and search engines.

The case of Nicholas Moore serves as a critical reminder that data security is no longer just about preventing theft; it’s about protecting individuals from public humiliation and potential harm. Staying informed, adopting proactive security measures, and understanding the evolving threat landscape are essential in this increasingly digital world.

Want to learn more about protecting your digital privacy? Explore our other articles on cybersecurity and data protection.

January 16, 2026 0 comments
0 FacebookTwitterPinterestEmail
Tech

Hackers stole over $2.7B in crypto in 2025, data shows

by Chief Editor December 24, 2025
written by Chief Editor

Crypto Heists Hit Record High: $2.7 Billion Stolen in 2025 – What’s Next?

The digital gold rush continues, but so do the robberies. A staggering $2.7 billion in cryptocurrency was stolen in 2025, marking a new peak for crypto-related hacks and thefts, according to leading blockchain analysis firms like Chainalysis and TRM Labs. This isn’t just a blip; it’s a worrying trend that demands attention from investors, exchanges, and regulators alike.

The Bybit Breach: A New Scale of Attack

The year’s most significant blow came with the $1.4 billion hack of Dubai-based crypto exchange Bybit. This single incident dwarfs previous large-scale thefts, such as the $625 million stolen from the Ronin Network in 2022. What’s particularly concerning is the attribution of this attack – and many others – to North Korean government-backed hackers. The FBI and blockchain analysis firms have directly linked the Lazarus Group to the Bybit breach, highlighting a sophisticated and well-funded adversary.

Did you know? North Korean hackers are believed to have stolen approximately $6 billion in crypto since 2017, using the funds to finance its nuclear weapons program.

Beyond Bybit: A Landscape of Vulnerabilities

While Bybit grabbed headlines, it was far from an isolated incident. Other notable hacks in 2025 included the $223 million theft from decentralized exchange Cetus, the $128 million loss from Balancer, and a $73 million breach at Phemex. These attacks demonstrate that vulnerabilities exist across the entire crypto ecosystem – from centralized exchanges to decentralized finance (DeFi) protocols.

The rise of DeFi, while offering exciting new financial opportunities, also introduces new attack vectors. Smart contract exploits, flash loan attacks, and oracle manipulation are becoming increasingly common, requiring developers to prioritize security audits and robust coding practices.

The Escalating Trend: A Year-by-Year Comparison

The $2.7 billion stolen in 2025 represents a significant jump from the $2.2 billion lost in 2024 and the $2 billion stolen in 2023. This upward trajectory suggests that cybercriminals are becoming more sophisticated, and the potential rewards are attracting more malicious actors. The increasing value of cryptocurrencies also makes them a more attractive target.

Future Trends: What to Expect in the Coming Years

Several key trends are likely to shape the future of crypto security:

Increased Sophistication of Attacks

Expect to see more complex and targeted attacks, leveraging artificial intelligence (AI) and machine learning to identify vulnerabilities and evade detection. Attackers will likely move beyond simple phishing scams and exploit zero-day vulnerabilities in smart contracts and exchange infrastructure.

Focus on DeFi Exploits

DeFi protocols will remain a prime target. Audits will become more crucial, but even audited contracts aren’t immune to exploits. Formal verification methods – mathematically proving the correctness of smart contract code – will gain prominence.

Regulatory Scrutiny and Compliance

Governments worldwide are increasing their scrutiny of the crypto industry. Expect stricter regulations regarding security standards, KYC (Know Your Customer) procedures, and reporting requirements. Exchanges and DeFi platforms will need to invest heavily in compliance to avoid penalties and maintain legitimacy.

Rise of Insured Crypto Custody

Demand for insured crypto custody solutions will grow. Investors will seek out providers that offer protection against theft or loss of funds, similar to traditional financial institutions. This will drive innovation in insurance products tailored to the unique risks of the crypto space.

Enhanced Blockchain Analytics

Blockchain analytics firms will play an increasingly important role in tracking stolen funds and identifying malicious actors. Advanced analytics tools will help law enforcement agencies recover stolen crypto and disrupt criminal networks.

Pro Tip: Always use strong, unique passwords and enable two-factor authentication (2FA) on all your crypto accounts. Consider using a hardware wallet for long-term storage of your crypto assets.

FAQ: Crypto Security Concerns

Q: What is a smart contract exploit?
A: A smart contract exploit occurs when attackers find vulnerabilities in the code of a smart contract, allowing them to steal funds or manipulate the contract’s functionality.

Q: How can I protect my crypto from hackers?
A: Use strong passwords, enable 2FA, store your crypto in a secure wallet (preferably a hardware wallet), and be wary of phishing scams.

Q: What is the role of blockchain analytics?
A: Blockchain analytics helps track the flow of funds on the blockchain, identify suspicious activity, and attribute hacks to specific actors.

Q: Are centralized exchanges or DeFi platforms more secure?
A: Both have their risks. Centralized exchanges are vulnerable to hacks of their infrastructure, while DeFi platforms are susceptible to smart contract exploits. Diversifying your holdings and using multiple security measures is crucial.

The future of crypto depends on building a more secure and trustworthy ecosystem. Addressing these emerging threats requires a collaborative effort from developers, exchanges, regulators, and investors. Staying informed and adopting best security practices are essential for navigating the evolving landscape of digital finance.

Want to learn more? Explore our other articles on blockchain security and DeFi risks. Share your thoughts in the comments below!

December 24, 2025 0 comments
0 FacebookTwitterPinterestEmail
Tech

Careto Hacking Group: Spanish Government Behind Cyberattacks?

by Chief Editor May 23, 2025
written by Chief Editor

Unmasking the Shadows: The Future of Government-Sponsored Cyber Espionage

The digital world is a battleground, and government-sponsored hacking groups are the special forces. The recent revelations surrounding “Careto,” a sophisticated cyber espionage operation, offer a glimpse into this shadowy realm. This article delves into the implications of these findings, exploring the potential future trends in government-backed cyber warfare, and the evolving landscape of digital security.

The Evolution of Stealth: How Cyber Actors Adapt

Careto, allegedly linked to the Spanish government, provides a fascinating case study. Its ability to remain undetected for years, coupled with its sophisticated malware, highlights the ever-increasing sophistication of state-sponsored hacking groups. They’re not just after data; they’re after strategic advantage.

The ability of groups like Careto to resurface after extended periods “in the dark” showcases their resilience. This suggests that these groups have robust operational security (OPSEC) protocols, skilled threat actors, and significant financial backing. This also means traditional detection methods are increasingly inadequate.

This trend will likely continue, with threat actors constantly refining their tactics, techniques, and procedures (TTPs). We can anticipate:

  • Increased Use of Zero-Day Exploits: Attackers will leverage undiscovered vulnerabilities in software and hardware, making detection extremely difficult.
  • Supply Chain Attacks: Targeting software vendors or hardware manufacturers to compromise their products, infecting a multitude of end-users. See how the SolarWinds hack demonstrated the devastating potential of supply chain attacks.
  • AI-Powered Attacks: Artificial intelligence will enhance attackers’ capabilities for automating attacks, crafting more convincing phishing campaigns, and rapidly adapting their strategies.

Targeting the Targets: Geopolitical Interests and Cyber Warfare

The Careto case reveals how geopolitical interests drive cyber espionage. The group’s focus on Cuba, Gibraltar, and entities in Brazil points to a strategic agenda. Understanding these motivations is key to predicting future attacks.

As nations increasingly rely on digital infrastructure, cyber attacks will become a primary tool for achieving geopolitical objectives. Expect to see:

  • Attacks on Critical Infrastructure: Targeting energy grids, financial systems, and communication networks.
  • Espionage and Data Theft: Stealing sensitive information from governments, corporations, and individuals to gain economic, political, and military advantages.
  • Disinformation Campaigns: Spreading false information to manipulate public opinion and sow discord.

Did you know? Cyberattacks can be used to weaken a nation’s economy, damage its reputation, or even influence elections. The repercussions can be long-lasting.

The Rise of Countermeasures: Securing the Digital Frontier

While the threat landscape evolves, so too must our defenses. The revelations about Careto highlight the need for stronger cybersecurity measures and a more proactive approach to threat detection.

Organizations and governments must invest in advanced security technologies, including:

  • Threat Intelligence Sharing: Collaboration is crucial. Sharing information about emerging threats, attack vectors, and adversary tactics.
  • Proactive Threat Hunting: Actively searching for signs of compromise within networks and systems.
  • Zero Trust Architecture: A security model that assumes no implicit trust. Requires all users and devices, inside and outside the network, to be verified before access is granted.
  • Enhanced Cybersecurity Education: Training employees and the public to identify and avoid cyber threats is essential.

Pro Tip: Regularly update your software and operating systems. Patches often address known vulnerabilities that cybercriminals exploit.

The Future of Attribution: Unmasking the Actors

Identifying the individuals or organizations behind cyberattacks is becoming increasingly important for holding attackers accountable and deterring future attacks. However, attribution is a complex and challenging process.

Future trends in attribution will likely involve:

  • Advanced Forensics: Developing more sophisticated techniques for analyzing malware, network traffic, and other artifacts to link attacks to specific actors.
  • International Cooperation: Sharing intelligence and coordinating law enforcement efforts across borders.
  • Public-Private Partnerships: Collaboration between government agencies and cybersecurity companies to identify and respond to threats.

FAQ: Your Questions Answered

What is a zero-day exploit?

A zero-day exploit is a vulnerability in software or hardware that is unknown to the vendor or the public. Attackers can exploit these vulnerabilities before a patch is available, making them highly dangerous.

How can I protect myself from spearphishing?

Be wary of unsolicited emails or messages, especially those asking for personal information or containing suspicious links. Verify the sender’s identity before clicking on links or opening attachments.

What is the role of threat intelligence in cybersecurity?

Threat intelligence involves gathering and analyzing information about cyber threats to understand attacker motivations, tactics, and targets. This information is used to proactively defend against attacks and improve overall security posture.

The world of cyber espionage is a constantly evolving landscape. The revelations about Careto serve as a stark reminder of the importance of digital security and the need for constant vigilance. Staying informed, adapting to new threats, and adopting proactive security measures are essential in navigating this complex and dangerous environment.

Do you have any further questions about Careto or other sophisticated threats? Share your thoughts in the comments below, and let’s discuss how we can better protect ourselves in this digital age. Also, explore more articles related to Cybersecurity.

May 23, 2025 0 comments
0 FacebookTwitterPinterestEmail

Recent Posts

  • WA mulls controversial mental health standard for lawyers

    May 3, 2026
  • Mark Carney Explains Canada’s Evolving Stance on US-Iran War

    May 3, 2026
  • Mark Carney Explains Canada’s Evolving Stance on US-Iran Conflict

    May 3, 2026
  • Philadelphia 76ers Defeat Boston Celtics in Game 7 to Advance to NBA Semifinals

    May 3, 2026
  • Shakira en Copacabana: Minuto a Minuto de su Show en Brasil

    May 3, 2026

Popular Posts

  • 1

    Maya Jama flaunts her taut midriff in a white crop top and denim jeans during holiday as she shares New York pub crawl story

    April 5, 2025
  • 2

    Saar-Unternehmen hoffen auf tiefgreifende Reformen

    March 26, 2025
  • 3

    Marta Daddato: vita e racconti tra YouTube e podcast

    April 7, 2025
  • 4

    Unlocking Success: Why the FPÖ Could Outperform Projections and Transform Austria’s Political Landscape

    April 26, 2025
  • 5

    Mecimapro Apologizes for DAY6 Concert Chaos: Understanding the Controversy

    May 6, 2025

Follow Me

Follow Me
  • Cookie Policy
  • CORRECTIONS POLICY
  • PRIVACY POLICY
  • TERMS OF SERVICE

Hosted by Byohosting – Most Recommended Web Hosting – for complains, abuse, advertising contact: o f f i c e @byohosting.com


Back To Top
Newsy Today
  • Business
  • Entertainment
  • Health
  • News
  • Sport
  • Tech
  • World