User Emails and Phone Numbers Compromised in Substack Data Breach

User Emails and Phone Numbers Compromised in Substack Data Breach In an email sent to their users this February, newsletter platform Substack apologized for a data breach in their company, which had allowed a third party to access user emails and phone numbers without permission. Substack’s site has over 50 million active subscriptions and 5 […]
Hackers Publish Personal Information Stolen During Harvard, UPenn Data Breaches

Hackers Publish Personal Information Stolen During Harvard, UPenn Data Breaches A hacking group known as ShinyHunters has released what it claims are more than one million stolen records from both Harvard University and the University of Pennsylvania, exposing sensitive alumni and donor information. The breach, originally disclosed in late 2025, involved systems tied to fundraising […]
Notepad++ Confirms Targeted Cyberattack Involving Malicious Software Updates

Notepad++ Confirms Targeted Cyberattack Involving Malicious Software Updates The developer of the open-source text editor Notepad++ confirmed that hackers compromised its update system, delivering malicious updates to a limited number of users between June and December 2025. Security researchers believe the attack was carried out by a China-linked espionage group and selectively targeted organizations in […]
72.7 Million Under Armour Emails Leaked

72.7 Million Under Armour Emails Leaked A threat actor allegedly leaked over 190 million records that were stolen from Under Armour, consisting mostly of customer and employee email addresses, as well as marketing data. Interestingly enough, according to one website that checks if email addresses have appeared in data breaches, 76% of the 72.7 million […]
Users Unable to Access Microsoft 365 Services

Thousands of Microsoft users were unable to access Microsoft 365 services on Thursday afternoon. Reports of issues began around 3 p.m., with approximately 16,000 users experiencing access problems. At 4:14 p.m. EST, Microsoft said in a statement that the affected infrastructure had been restored to a “healthy state”. The company did not immediately respond to […]
How a Hacking Campaign Targeted High-Profile Gmail and WhatsApp Users Across the Middle East

How a Hacking Campaign Targeted High-Profile Gmail and WhatsApp Users Across the Middle East A recent hacking campaign in the Middle East used highly targeted phishing to break into the Gmail and WhatsApp accounts of prominent individuals. The attackers relied on convincing social‑engineering tactics rather than technical exploits, tricking victims into handing over login credentials […]
Cyberattack on ICE List Website

Cyberattack Targets ICE List Website The ICE List website seeks to hold immigration agents accountable. Following reports that it was going to publish the names of thousands of ICE and Border Patrol employees, the website was hit by a distributed denial-of-service (DDos) attack, allegedly originating from Russia. Read more below. Sourced from Raw Story
Hacktivist deletes white supremacist websites live onstage during hacker conference

Hacktivist Deletes Multiple Websites Live Onstage During Hacker Conference A hacktivist known as Martha Root remotely deleted three white supremacist websites live on stage during a presentation at the Chaos Communication Congress in Hamburg, Germany. Dressed as the Pink Power Ranger, they wiped the servers in real time at the end of a talk given […]
Cyberattack on Apple Assembly Partner

Cyberattack on Apple Assembly Partner Apple’s supply chain has always been a target for hackers. In December 2025, one of Apple’s Chinese suppliers was the target of a sophisticated cyber attack. Investigations around the attack are still ongoing, and operational impact as well as data exposure are still unclear. Read more below. Sourced from Apple […]
Cybercriminals Exploit Google Cloud Service for Phishing Attack

Cybercriminals Exploit Google Cloud Service for Phishing Attack Cybercriminals are exploiting Google Cloud’s Application Integration service to send phishing emails that appear legitimate, bypassing traditional security filters. These emails mimic routine notifications like voicemail alerts or file access requests, convincing recipients to click on malicious links. The links redirect users to a fake Microsoft login […]