Latest IT News, Cybersecurity Alerts & Tech Innovations

Microsoft Fixes Windows 11 Search Bug Caused by Bing Update
Microsoft resolved a Windows 11 search issue that displayed blank results after a problematic Bing update broke the Start menu search functionality.

Eurail Data Breach Exposes 300,000 Customer Records
Eurail B.V. disclosed a December 2025 cyberattack that compromised personal information of over 300,000 European rail pass customers.

Adobe Reader Zero-Day Exploited via Malicious PDFs Since December
Attackers have been exploiting a zero-day vulnerability in Adobe Reader through weaponized PDF documents since December 2025.

Bitcoin Depot Loses $3.6M in Crypto Wallet Breach
Bitcoin Depot suffered a cyberattack that resulted in $3.665 million worth of Bitcoin stolen from company wallets last month.

Microsoft Suspends Key Open-Source Developer Accounts
Microsoft suspended developer accounts maintaining critical open-source projects without notice, blocking Windows security patches and software builds.

Magento Stores Hit by SVG-Hidden Credit Card Skimmer
Nearly 100 Magento e-commerce stores compromised by attackers hiding credit card-stealing malware inside pixel-sized SVG images.

UNC6783 Hackers Target BPO Firms to Access Corporate Data
Google's Mandiant identifies UNC6783 threat group exploiting business process outsourcing providers to infiltrate high-value corporate targets across multiple industries.

Atomic Stealer Targets macOS via Script Editor ClickFix Attacks
Cybercriminals deploy Atomic Stealer malware through Script Editor abuse, tricking macOS users into executing malicious Terminal commands via ClickFix tactics.

Apache ActiveMQ Classic RCE Flaw Exposed After 13 Years
Security researchers uncovered a critical remote code execution vulnerability in Apache ActiveMQ Classic that remained hidden for over a decade.

WhatsApp Tests Username System to Hide Phone Numbers
WhatsApp begins beta testing username feature allowing users to communicate without sharing phone numbers with contacts.

Anthropic Launches Project Glasswing AI Security Initiative
Anthropic unveils Project Glasswing using Claude Mythos AI model to detect vulnerabilities with AWS, Apple, and security firms.

North Korean Hackers Target Go, Rust, PHP Developers
North Korea's Contagious Interview campaign deploys malicious packages across Go, Rust, and PHP ecosystems to target developers worldwide.

Microsoft Fixes Windows 11 23H2 Start Menu Search Bug
Microsoft deployed a server-side fix for a Windows 11 23H2 Start Menu search issue affecting some devices on April 8, 2026.

FBI: Cyber Crimes Cost Americans $21 Billion in 2025
The FBI reports U.S. victims lost nearly $21 billion to cyber-enabled crimes in 2025, with investment scams and business email compromise leading the surge.

AI Systems Vulnerable to Hidden Web-Based Command Injection
Researchers discover AI models can be tricked into executing malicious instructions hidden on attacker-controlled web pages, potentially exposing sensitive data.

Iranian Hackers Target US Critical Infrastructure PLCs
Iranian-linked threat actors are actively targeting Internet-exposed Rockwell Allen-Bradley programmable logic controllers across U.S. critical infrastructure networks.

Chrome Gets Vertical Tabs and Enhanced Reading Mode
Google begins rolling out vertical tabs and improved reading mode features to Chrome browser users worldwide.

CVE-2025-59528: Hackers Exploit Critical Flowise RCE Flaw
Attackers are actively exploiting CVE-2025-59528, a maximum-severity remote code execution vulnerability in Flowise LLM platform.

APT28 Hijacks MikroTik and TP-Link Routers for Espionage
Russia-linked APT28 group compromised insecure MikroTik and TP-Link routers since May 2025, converting them into malicious infrastructure for cyber espionage operations.

Law Enforcement Disrupts APT28 Router Hijacking Campaign
International authorities dismantled FrostArmada, an APT28 operation that compromised MikroTik and TP-Link routers to steal Microsoft credentials.

GrafanaGhost Attack Exploits AI Components for Data Theft
Security researchers discovered GrafanaGhost attack technique that exploits Grafana's AI components to bypass security controls and steal enterprise data.

