Subscribe
Sign in
Home
Threat Intelligence
AI Research
Darknet and Hacking Forums
Data Breaches
Latest
Top
Google's Tensor Secrets Were in Tehran: The Insider Threat That Slipped Past Silicon Valley
Three engineers. Hundreds of files. One family scheme. And trade secrets about Google's most sensitive chip technology — photographed and carried to…
12 hrs ago
•
Tom
PayPal’s Silent Six Months: The Breach That Hid in the Code
A software error, a loan app, and Social Security numbers sitting exposed for 165 days. PayPal had a problem — and its customers were the last to know.
15 hrs ago
•
Tom
Operation Red Card 2.0: The $45 Million Takedown of Africa’s Cyber Syndicate
The industrialized scale of modern cybercrime just met the industrialized scale of international law enforcement.
Feb 19
•
Tom
Blockchain Fortress, Human Gatekeeper: How Figure Tech Lost 1 Million IDs to a Phone Call
The promise of blockchain is immutable security. The reality of fintech is that a single employee login is worth more than all the cryptography in the…
Feb 18
•
Tom
How a Trojanized Oura Server Infiltrated AI Ecosystems
Your biometric data isn't the only thing the Oura ring can connect to anymore—now, it might be the gateway for an infostealer.
Feb 17
•
Tom
ZeroDayRAT: The Nation-State Toolkit Now Available to the Highest (Telegram) Bidder
The barrier to entry for total mobile domination just hit zero.
Feb 16
•
Tom
How 2,420 Russian Starlink Terminals Just Became Digital Targets
It wasn't a missile that blinded the Russian drone teams in Zaporizhzhia this week. It was a QR code and a Telegram bot.
Feb 14
•
Tom
Adversaries Are Now Cloning High-End AI Reasoning
In mid-February 2026, Google Threat Intelligence Group confirmed a dangerous shift: attackers aren't just using AI tools; they are stealing the…
Feb 12
•
Tom
When the Zoom Call Is the Malware: UNC1069 and the Industrialization of AI-Driven Trust Exploitation
We’ve crossed the line where AI is merely assisting phishing, and entered a phase where AI is embedded inside the social engineering infrastructure…
Feb 11
•
Tom
When AI Becomes the Vulnerability Hunter, Claude Opus 4.6 and the Acceleration of Software Risk
In early February 2026, Claude Opus 4.6 identified more than 500 high-severity vulnerabilities across widely used open-source libraries.
Feb 6
•
Tom
Disrupted Trust, How Scattered Lapsus$ Hunters Breached Betterment and Turned Customer Data Into a Weapon
In early January 2026, one of the largest automated investment platforms in the United States found itself exposed not by a software flaw or a zero-day…
Feb 5
•
Tom
Phantom Office: How APT28 Weaponized a Just,Patched Microsoft Bug in Days
Zero,days used to be rare. Now they’re strategic accelerants , weaponized before defenders can blink.
Feb 4
•
Tom
This site requires JavaScript to run correctly. Please
turn on JavaScript
or unblock scripts