TEATIME NEWS | Early Birds   Morning   Lunch   Afternoon |
Infostealer malware now harvests much more than passwords - collecting cookies, histories, and files to create comprehensive digital identities, putting both individuals and enterprises at risk.
CISA has given federal agencies just three days to patch a critical Dell vulnerability already under attack by a suspected Chinese cyber-espionage group. The flaw, found in Dell's RecoverPoint, has enabled advanced malware deployment and persistent breaches. The race is on to secure government networks before more damage is done.
Cisco warns the core protocol connecting AI to business data is dangerously insecure, exposing organizations to potential supply-chain attacks reminiscent of SolarWinds. Here’s what’s at stake - and why urgent action is needed.
Wall Street is worried AI could make cybersecurity obsolete, but Palo Alto Networks CEO Nikesh Arora says the opposite: AI is creating new risks and more demand for digital defense. Our investigation breaks down the debate and what it means for the future of cyber protection.
As hospitals increasingly use SMS to promote health screenings, privacy concerns mount. This feature investigates how GDPR governs the use of patient phone numbers for public health outreach, the risks of accidental disclosure, and the safeguards required by law.
Elon Musk’s AI chatbot Grok is courting controversy as users are urged to upload sensitive health data for medical advice - a move that bypasses strict European regulations and sparks concerns about privacy, safety, and regulatory oversight.
Italy’s Privacy Guarantor now lets health agencies use patient phone numbers for screening SMS - under strict new rules. Here’s how the balance between prevention and privacy is being managed.
A wave of new vulnerabilities - from OpenSSL exploits to AI mishaps - is reshaping the digital threat landscape. This feature investigates the week’s top security risks and what they mean for defenders.
Despite the buzz around AI coding, the real challenge is defining what needs to be built. This feature explores why clear requirements - and human ingenuity - still matter in the age of intelligent machines.
#AI Programming | #Human Ingenuity | #Requirements Engineering
Hot water is shaking up the world of 3D printing by offering a new method for reshaping PLA parts. While it promises more even heating and better results, it brings fresh risks like water absorption, hydrolysis, and safety concerns. Is this technique a breakthrough or just another hazard for makers?
Link11’s new AI Management Dashboard is changing the way companies handle AI-powered web traffic, providing detailed analytics, compliance tools, and real-time insights into the world of AI crawlers.
A critical cloud storage flaw at Abu Dhabi Finance Week exposed over 700 passports - including those of former UK PM David Cameron and billionaire Alan Howard - highlighting the risks of third-party digital vendors.
Qilin, a notorious ransomware group, has listed Kensington HPP as its latest victim. The attack, detected on February 19, 2026, signals an ongoing wave of cyber extortion targeting businesses worldwide.
A hardcoded password in Dell’s RecoverPoint backup software gave China-linked hackers total control, enabling them to deploy the advanced GrimBolt malware and threaten organizations’ disaster recovery capabilities. Here’s how it happened - and what you need to know to defend your systems.
A cyber intruder exploited a single set of stolen credentials to access France’s national bank account registry, exposing sensitive data from 1.2 million accounts. The breach highlights dangerous gaps in privilege management and leaves millions at risk of scams.
A major breach of France’s FICOBA database has exposed personal data from over 1.2 million bank accounts. The attack, involving stolen government credentials, underscores the vulnerability of centralized administrative databases across Europe.
The Cheyenne and Arapaho Tribes faced a crippling ransomware attack by the Rhysida gang, disrupting schools and government services. Tribal leaders refused to pay the $660,000 ransom, standing firm against digital extortion as recovery efforts continue.
Nightspire, a notorious ransomware group, has publicly added MD Charts to its victim list. This incident underscores the relentless evolution of cyber extortion and the need for vigilant defenses.
Cloud Range’s AI Validation Range lets security teams test and train AI models in realistic cyberattack scenarios, providing critical insights into performance and reliability before deploying AI in real-world operations.
AFTERNOON NEWS | Early Birds   Morning   Lunch   [top] |
A new wave of cyberattacks leverages Microsoft’s legitimate device code authentication flow and vishing to compromise corporate accounts and steal sensitive data. Here’s how it works - and how to stop it.
Texas sues networking giant TP-Link for allegedly enabling Chinese state-backed cyberattacks and misleading consumers about product security and origins. The case spotlights deepening national security concerns over foreign tech supply chains.
A Nigerian hacker used phishing and advanced malware to steal millions from U.S. tax firms, exposing systemic cybersecurity weaknesses and landing an eight-year prison sentence.
The EU’s new Action Plan IP/26/332 aims to revolutionize online child protection, blending rapid abuse reporting, legally solid evidence gathering, and instant psychological support. Discover how Europe is setting a new global standard in the fight against cyberbullying.
Event-driven accounting automates financial entries the moment business events happen, eliminating delays and boosting transparency. Explore how this real-time approach is reshaping finance, the tech powering it, and the challenges companies face.
Italy’s intelligence agencies are seeking cyber and engineering experts for a new era of digital threats. Explore the degrees and specializations in demand - and what this reveals about the future of espionage.
#Intelligence Recruitment | #Cybersecurity | #Quantum Computing
An investigative look at how underground developers are stripping safety filters from AI models with HERETIC, unleashing new creative potential - but also fueling a surge in cybercrime.
YouTube is no longer just a video platform; it's becoming a major force in online shopping and creator-driven commerce. But as brands and influencers rush in, new cybersecurity risks and market challenges emerge.
AI agents are disrupting the software value chain, pushing Italian SMEs to confront tough choices about their digital future. Will they adapt or be left behind?
AI-driven phishing and business email compromise attacks are outsmarting traditional email security. Discover why integrated platforms and human vigilance are the new frontline in the war against digital deception.
The Digital Networks Act aims to revolutionize Europe’s telecom landscape, but conflicting interests and practical hurdles may limit its impact. Our investigation breaks down the realities behind the EU’s latest digital gamble.
Italy, India, and Kenya's AI initiative in Africa promises progress, but beneath the surface lies a web of power plays, data dilemmas, and digital sovereignty challenges. Who truly benefits from this alliance?
Italy’s intelligence agencies are undergoing a digital transformation, seeking hackers, cryptographers, and HPC specialists to combat emerging cyber threats and hybrid warfare. Explore the new professional roles at the heart of Italy’s cyber defense strategy.
#Cyber Intelligence | #Cryptography | #High Performance Computing
Email bombing and denial-of-attention attacks show how cybercriminals and harassers exploit the same human vulnerabilities. Learn why breaking down silos in threat intelligence is critical to defending against modern digital threats.
A sweeping new crypto scam campaign is targeting Asia and beyond, blending malicious ads and AI-powered chatbots in psychological fraud tactics. Learn how this hybrid model operates and what makes it so dangerous.
Citizen Lab has revealed that Kenyan police used Cellebrite’s powerful digital forensics tool to unlock and extract data from activist Boniface Mwangi’s phone, exposing the risks of advanced surveillance tech in law enforcement.
As cyberattacks surge against small businesses, the financial and operational fallout can be devastating. Learn why cyberinsurance is now a survival tool, not a luxury, for SMBs facing relentless digital threats.
China’s dual vulnerability databases, CNNVD and CNVD, run on different rules and timelines than Western CVE systems. Their secretive disclosures and state oversight create blind spots for global defenders. Here’s why fusing these feeds is critical for future cyber resilience.
Figure Technology faces fallout after a data breach exposes nearly a million customers. ShinyHunters, leveraging social engineering, orchestrated the attack - raising urgent questions about human factors in cybersecurity.
Link11’s new AI Management Dashboard exposes, audits, and controls AI bot traffic, helping businesses defend their data and comply with rising regulations. Discover how this tool changes the game in digital security.
Nearly a million Figure Technology Solutions users have had their data exposed following a sophisticated social engineering attack. ShinyHunters, a prolific hacker group, is behind the breach, raising urgent questions about the security of fintech platforms and the growing threat of targeted cybercrime.
Kensington-HPP became the latest casualty in a wave of ransomware attacks, suffering operational paralysis and data theft. Our investigation reveals how attackers breached defenses, what went wrong, and the critical lessons every organization must learn.
LUNCH NEWS | Early Birds   Morning   [top] |
A massive INTERPOL-led crackdown has resulted in 651 arrests across 16 African countries, exposing the scale and tactics of cybercriminal networks behind investment fraud, mobile money scams, and predatory loan apps.
The future of mobility is data-driven, but incompatible vehicle data is creating a hidden crisis. Learn how standardization, interoperability, and smarter governance are crucial for unlocking the full value of connected cars.
#Connected Cars | #Data Interoperability | #Predictive Maintenance
FinOps is changing the way companies view IT costs, shifting them from burdens to competitive advantages. Explore how this financial operations movement is reshaping the digital landscape - and the hidden risks it brings.
As Europe redefines military strategy, bioengineering and advanced medical technologies are turning the human body into a new line of defense. Explore the innovations, challenges, and ethical questions reshaping the future battlefield.
Italy’s new PNRR Simplification Decree promises to accelerate public administration by slashing deadlines, enforcing digital data sharing, and holding managers liable for delays. Is this the end of bureaucratic gridlock or just a new set of challenges?
Schools claim to ban AI, but the technology is already running the classroom from behind the scenes. Explore the hidden influence of artificial intelligence in education and why acknowledging it is crucial.
#Artificial Intelligence | #Digital Literacy | #Education Policy
Italy’s tax agency confirms: mistakes in bonus communications don’t erase business rights to investment credits, but using them before fixing paperwork can mean steep fines. Here’s what every company needs to know.
AI has collapsed the traditional response window in cybersecurity. Attacks now unfold at machine speed, chaining minor exposures into devastating breaches before defenders can react. Here’s how the rules have changed - and what you can do about it.
#AI Cyberattacks | #Digital Risk | #Security Vulnerabilities
North Korean hackers are targeting crypto developers through fake job interviews and infected code, deploying a backdoor and counterfeit MetaMask wallets to steal digital assets in a sophisticated new campaign.
A fake Homebrew installer campaign is tricking Mac developers into installing Cuckoo Stealer, a potent infostealer and remote-access trojan, by abusing trust in copy-paste Terminal commands. No exploits - just social engineering.
A new ClickFix attack variant uses the trusted Windows nslookup.exe tool and DNS Name fields to covertly stage malware, bypassing traditional security defenses. Discover how this technique works and why it’s so hard to catch.
A severe security flaw in Honeywell CCTV cameras allows attackers to take over surveillance feeds and access sensitive networks. CISA urges organizations to act fast as no official patch is available yet.
#CCTV vulnerability | #Honeywell cameras | #global surveillance
A fake CAPTCHA prompt led employees to unwittingly install advanced malware, allowing attackers to infiltrate and persist within enterprise networks for months - all without exploiting any software vulnerabilities.
#Malware Epidemic | #Social Engineering | #Corporate Networks
Microsoft Defender’s latest update introduces a centralized script library with Copilot-powered analysis, giving SOC teams instant access, AI-driven risk summaries, and streamlined live response - marking a new era in incident preparedness.
A new 3D-printing hack, PCB Forge, is letting DIYers produce custom PCBs at home without chemicals or delays. Is this the start of a hardware hacker renaissance?
A focused emulation and fuzzing campaign revealed six critical DoS vulnerabilities in Socomec's DIRIS M-70 IIoT power gateway, showing how targeted research can expose hidden risks in vital industrial devices.
Citizen Lab’s investigation finds that Kenyan police used Cellebrite forensic tools to extract data from activist Boniface Mwangi’s phone, sparking concerns over privacy, surveillance, and human rights abuses.
Sweden’s security services have issued a stark warning about escalating Russian hybrid warfare tactics - including cyberattacks and sabotage - at NATO’s northern borders. As tensions rise, neighboring countries and NATO stress unity and increased defense spending to deter further aggression.
The Cloak ransomware group has targeted Dinnebiergruppe.de, one of Germany’s top automotive dealers, in a high-profile cyberattack that highlights the growing threat to the automotive sector.
OpenClaw’s AI assistant faces relentless security threats, including recent mass exploits and supply chain attacks. The debut of SecureClaw - a new open-source auditing and hardening tool - offers hope, but only if users pay attention.
Investigators have uncovered a months-long global campaign exploiting Ivanti’s Endpoint Manager Mobile zero-day vulnerabilities, with attacks traced back to July 2025. Attackers gained full control over MDM infrastructure, deploying malware and persistent backdoors before patches were released.
Venice Security bursts out of stealth with $33 million to tackle privileged access risks using real-time, agentless technology for hybrid enterprise environments.
Secureae’s reputation as a digital stronghold was shattered when hackers leaked sensitive data via Ransomfeed. This feature investigates how the breach unfolded, the criminal economy behind it, and what it signals for cybersecurity’s future.
Dinnebier Group, a prominent German automotive retailer, faces operational chaos after a ruthless ransomware attack encrypts its data and threatens to leak sensitive information. This exposé investigates the methods, impact, and implications for the automotive industry.
The Handala ransomware group has published evidence claiming a breach of Israel’s highly secretive Sapir crisis management system, raising alarms over the vulnerability of national security networks.
MORNING NEWS | Early Birds   [top] |
As CO₂ prices surge under the EU’s Emissions Trading System, industries in Italy and Germany face mounting costs and stalled investments, while France and Spain take a different path. Is Europe’s climate policy risking its industrial core?
#Emissions Trading System | #CO₂ Prices | #European Industry
AI agents are no longer just assistants - they’re autonomous actors with real power and risk. This investigation reveals who’s responsible when things go wrong, and what organizations must do to stay secure and compliant.
GABIE is Italy’s groundbreaking digital platform that uses AI, genomics, and open data to predict, monitor, and help prevent infectious disease outbreaks, making epidemic intelligence accessible to all.
AI is quietly transforming the world’s kitchens, helping chefs slash waste, invent new dishes, and run greener operations - all without losing the human touch.
#Artificial Intelligence | #Culinary Innovation | #Waste Reduction
Generative AI is quietly revolutionizing enterprise workflows, eliminating bottlenecks, reducing rework, and raising the bar for operational speed and quality. The new competitive risk: clinging to outdated, manual processes.
#Generative AI | #Enterprise Workflows | #Operational Excellence
Since 2021, Italians can open an Srl (limited liability company) online, but most still avoid the digital route. Netcrook investigates the bureaucratic, cultural, and cybersecurity factors behind Italy’s slow adoption of online business formation.
Europe’s move to automate online consent could end pop-ups, but risks making your choices invisible, hackable, and legally uncertain. Dive into the new frontlines of digital privacy.
Behind the EU’s strong privacy laws lies a labyrinthine network of national and supranational watchdogs. Discover how the GDPR’s enforcers cooperate, clash, and adapt in a rapidly evolving digital world.
As smart security devices become standard in Italian homes, the promise of a safer life grows. But does more tech equal more protection? This feature investigates the data, cultural shifts, digital risks, and the human factors behind the connected home boom.
A new cyber-espionage campaign, CRESCENTHARVEST, is targeting Iran protest supporters with sophisticated malware hidden in protest-themed files. Discover how attackers deploy remote access trojans, exploit trust, and blend into online traffic as part of a broader digital crackdown.
A wave of fake IPTV apps is delivering advanced Android malware across Europe, enabling remote device takeover and banking fraud. Investigators reveal how the Massiv trojan tricks users, bypasses security, and launders money using victims’ identities.
iOS 26.4 is set to bring ChatGPT, Claude, and Gemini to Apple CarPlay, letting drivers access advanced AI assistants from their dashboards. Here’s what’s coming, what’s limited, and why it matters.
Fanatical is offering Tempest: Pirate Action RPG for free, but the deal comes with strings attached. Explore the marketing tactics, restrictions, and user implications behind the latest Steam game giveaway.
YouTube is testing its conversational AI on select TVs and streaming devices, turning passive viewing into an interactive experience. Discover how this shift could transform your living room - and what it means for your privacy.
Google’s new Lyria 3 AI music generator inside Gemini lets anyone create 30-second songs from simple prompts. But as the lines blur between creativity and copyright, is this the future of music - or a legal minefield?
Hackers are now abusing popular AI chatbots like Grok and Microsoft Copilot to stealthily control malware, disguising attacks as normal user activity and evading detection. Discover how this technique works and what it means for the future of cyber defense.
A flaw in Microsoft 365 Copilot let AI summarize protected emails, bypassing security labels and DLP controls. This exposes sensitive data and raises urgent questions about AI trust and enterprise safeguards.
Researchers have uncovered a sophisticated SysUpdate malware variant now targeting Linux systems. Using advanced encryption and masquerading as system services, the malware - linked to APT27 - demands new defensive strategies.
A hacker’s magnetic levitation tribute brings the iconic Lemmings game to life, blending nostalgia, sound, and innovative tech in a floating diorama.
A highly convincing phishing campaign uses a fake Google Forms site to harvest Google credentials from job seekers. Discover how the scam works and how to stay safe.
A newly discovered flaw in Honeywell CCTV cameras could let hackers take over accounts and access live feeds. CISA urges urgent action to protect organizations from this high-severity vulnerability.
Microsoft Defender’s new centralized script library, powered by Security Copilot, enables security teams to manage and analyze investigation tools in advance, promising faster and safer live response operations.
#Microsoft Defender | #AI Script Library | #Security Operations Center
A new infostealer attack has stolen the memory and identity files of an OpenClaw AI, granting hackers access to the victim’s digital life. Experts warn this marks a dangerous shift in cybercrime, as AI assistants become prime targets.
Deutsche Bahn, Germany’s rail giant, was hit by a large-scale DDoS attack that disrupted ticketing and passenger information systems. The attack, possibly linked to hacktivist groups, highlights growing cyber risks to critical infrastructure.
Qilin ransomware group has claimed a fresh victim: Graneles de Chile. The attack on this major grain distributor signals rising cyber threats to Latin America’s critical supply chains.
Qilin ransomware has targeted Willow Construction, signaling a new wave of cyber threats for the construction sector. Discover the details of the attack and its implications for industry cybersecurity.
Anthropic’s Claude Sonnet 4.6 is redefining operational automation and security. Dive into the model’s technical strengths, from seamless authentication to advanced analytics - and learn why vigilance is still key in the age of AI-driven operations.
Italy’s 2030 gigabit internet plan sets high hopes for nationwide high-speed access, but longstanding technical and bureaucratic issues remain a major barrier to true digital transformation.
As YouTube unveils sweeping changes for 2026, creators and viewers face a transformed landscape shaped by artificial intelligence, tighter moderation, and demands for transparency. Will the next generation of internet stars rise or fall under the new regime?
Italy’s ACN taxonomy finally brings clarity to cyber incident notifications under Law 90, setting strict definitions and aligning with EU rules for streamlined, accountable reporting.
The EU’s NIS2 Directive marks a shift in cybersecurity, making the human factor - not just technology - the central focus in the fight against digital threats.
Chief Information Officers are stepping out of the shadows, becoming key business strategists who shape digital transformation and enterprise success. Discover the new CIO playbook.
In 2025, South Africa faced a relentless wave of digital scams: 42% of adults lost money, and criminals pocketed $2.3 billion. Despite high awareness, weak enforcement and low restitution rates allow fraudsters to thrive.
OpenAI’s EVMbench puts AI to the test in blockchain security, with models now rivaling human hackers in exploiting smart contract flaws. Can this tool protect billions in crypto - or will it fuel the next wave of cybercrime?
Hackers are abusing trusted AI chatbots like Grok and Copilot to secretly control malware, turning everyday enterprise tools into stealthy command-and-control channels that evade detection.
#AI Malware | #Cybersecurity Threats | #Chatbot Exploitation
A sophisticated phishing campaign is duping MetaMask users with realistic PDF security reports and cloud-hosted fake login pages. Here’s how the scam sidesteps filters and what you can do to stay safe.
A stealthy malware campaign is turning even air-gapped computers into Monero mining rigs by spreading through USB drives and exploiting vulnerable drivers. Discover how attackers are raising the stakes in the cryptojacking game with advanced persistence and kernel-level tricks.
Hackers behind the ClickFix campaign are abusing Windows' nslookup.exe to deliver malware through DNS, blending malicious payloads with normal traffic and evading detection. Discover how this sophisticated technique works and how security teams are fighting back.
Hackers are weaponizing emojis and Unicode tricks to conceal malware and evade modern security systems - even fooling AI. Learn how emoji smuggling works and how to defend against this invisible threat.
#Emoji Smuggling | #Cybersecurity Threats | #Unicode Exploits
Predator spyware has struck Angola, compromising journalists’ devices and sparking fresh debate on surveillance technology. Learn how the attack unfolded, who is at risk, and why international regulation is more critical than ever.
A recently confirmed Office 365 bug allowed Microsoft’s Copilot AI to access confidential emails, even those protected by security labels and Data Loss Prevention. This incident raises serious concerns about the safety of sensitive data in AI-powered business tools.
Côte d’Ivoire’s national airline, aircotedivoire.com, has been listed as a victim by the Incransom ransomware group, highlighting persistent cybersecurity challenges in the aviation sector.
OpenClaw’s ClawHub has become ground zero for a massive supply chain attack, as the ClawHavoc campaign sneaks over 1,000 malicious Skills into the AI marketplace. Netcrook investigates how unsuspecting users became victims of credential theft, remote control Trojans, and sophisticated social engineering.
Foxveil is a sneaky new malware loader that hides its payloads on trusted platforms like Cloudflare, Netlify, and Discord, making detection difficult and signaling the future of stealthy cyberattacks.
A sophisticated cybercrime operation is targeting Booking.com partners and travelers through a two-stage phishing scheme. Attackers first compromise hotels, then use stolen booking data to scam guests. Discover how the campaign works and the techniques behind it.
A modern silversmith reimagines the pocket watch by fusing Victorian aesthetics and ESP32 tech, inspired by 'The Diamond Age.' Explore the intersection of literature, craftsmanship, and open-source innovation.
New research reveals that compromised Model Context Protocol (MCP) servers can hijack AI-powered workflows, enabling stealthy code execution and mass data theft across organizations.
Hackers are exploiting AI platforms Grok and Copilot as covert channels for malware, bypassing standard defenses and ushering in a new era of adaptive, AI-driven cyber threats.
DigitStealer, a stealthy macOS infostealer, has had its secret infrastructure exposed by researchers. Learn how technical fingerprints and domain patterns are helping defenders track and block this evolving threat.
OpenAI’s EVMbench is shaking up blockchain security, allowing AI to both find and exploit smart contract vulnerabilities in a controlled environment. Will this tool become blockchain’s best defense - or its greatest threat?
Air Côte d’Ivoire, Ivory Coast’s national airline, is reeling after a ransomware attack exposed vulnerabilities in African aviation. We investigate the breach, the risks, and the rising threat of cybercrime in the region.
Forget glass lenses - researchers are using Scotch tape and powerful algorithms to capture images in a whole new way. Explore the future of lensless photography and its far-reaching implications.
#Scotch tape | #Lensless imaging | #Computational photography
A flaw in Microsoft 365 Copilot is allowing confidential emails to be summarized by AI, sidestepping data protection rules and risking exposure of sensitive information. The issue, rooted in a code-level defect, highlights the challenges of relying on AI for enterprise security.
EARLY BIRDS | [top] |
Incransom has dumped 279GB of sensitive files from Valgo SA, putting confidential projects and major industrial clients at risk. The breach highlights the urgent need for cybersecurity in the environmental sector.
A logic error in Microsoft’s anti-phishing system led to a week-long incident, quarantining legitimate emails and Teams messages and raising questions about the reliability of automated security measures.
Telegram channels are accelerating the weaponization of SmarterMail vulnerabilities, enabling ransomware groups to exploit email servers for initial access and lateral movement. Learn how attackers move from disclosure to breach in days - and how organizations can defend against the next wave.
Mainstream AI platforms are being hijacked by cybercriminals to relay malware commands, turning trusted chatbots into covert accomplices. Find out how this emerging threat works and what it means for digital security.
A critical authentication bypass flaw in Honeywell CCTV cameras could allow attackers to hijack accounts and access sensitive surveillance feeds across commercial and critical infrastructure sites, with no fix yet released.
#Honeywell CCTV | #Security Vulnerability | #Authentication Bypass
Cyber attackers are using artificial intelligence to breach systems faster than ever, exploiting vulnerabilities and trusted integrations at unprecedented speed. Learn how defenders are struggling to keep pace in the new era of AI-driven cybercrime.
A surge in cyberattacks driven by stolen credentials and supply-chain vulnerabilities is putting businesses at unprecedented risk. Dataminr's latest report shows how hackers are using AI and third-party platform exploits to breach organizations on a massive scale.
Italy launches a €733 million plan to connect 1.8 million underserved addresses by 2030, but past failures and accountability gaps raise questions about whether this digital rescue will succeed where others have failed.
The European Commission is investigating Shein for allegedly manipulating users with addictive design and opaque algorithms, under new digital regulations. The outcome could set a precedent for all major online platforms.
The EDPS has released transformative new rules that strengthen the independence, authority, and operational scope of Data Protection Officers across EU institutions - making DPOs key players in the continent’s privacy defense.
AI-driven scrapers have turned data theft into a board-level crisis. Learn how security leaders are mapping risks and deploying new strategies to defend their most valuable data assets.
A critical vulnerability in Dell’s RecoverPoint left enterprise networks exposed to Chinese nation-state hackers. Learn how a single hard-coded credential opened the door to years of cyber-espionage - and what it means for supply chain security.
A newly revealed bug in Grandstream’s GXP1600 VoIP phones exposes small businesses to eavesdropping and network compromise. Here’s how attackers exploit overlooked devices - and how organizations can fight back.
A new wave of cybercrime uses AI-powered chatbots to impersonate trusted assistants like Google Gemini, luring victims into buying a fake cryptocurrency called 'Google Coin.' This investigative feature breaks down how the scam works and what red flags to watch for.
A severe bug in Grandstream GXP1600 VoIP phones allowed hackers to seize control, extract credentials, and eavesdrop on calls - all without a password. Discover how this vulnerability was found, exploited, and finally fixed.
#VoIP vulnerability | #Grandstream phones | #remote code execution
Citizen Lab and Amnesty International have uncovered misuse of Cellebrite and Predator commercial surveillance tools by authorities in Kenya and Angola, exposing a global trend of targeting activists and journalists with advanced digital espionage.
Milwaukee power tools have a reputation for performance, but a recent repair saga uncovers major flaws in their repairability, leaving users with high costs and few options.
A new web-based simulator brings the legendary slide rule back to life, teaching users the analog calculation methods that shaped modern engineering, decades before digital calculators took over.
Hackaday Europe 2026 is shaking up the continent’s hacker scene with a new Italian venue, an open invitation for talks and workshops, and a hands-on badge experiment. Find out how to participate and what makes this year’s event a must-attend for hardware and software innovators.
Engineer Luke Maximo Bell is on a mission to break the world record for longest quadcopter flight, reimagining drone design for maximum efficiency. His prototype has already surpassed previous endurance records, hinting at a new era for electric drones.
Discover how Dutch street organs use punch cards and air-powered mechanics to play everything from classics to pop hits - an early form of programmable music technology.
#Dutch street organ | #Programmable music | #Mechanical artistry
Think you're safe online? Think again. Find out how five simple changes can dramatically boost your internet security and keep cybercriminals at arm's length.
The Insomnia ransomware gang has struck Application Solution Providers, exposing the company to potential data leaks and extortion. Discover what happened, why it matters, and what it means for the future of cyber threats.
A single Firebase misconfiguration left 300 million AI chat messages from Chat & Ask AI users exposed. This investigative feature reveals how a common security slip put deeply personal data at risk - and why it signals a growing threat in AI app development.
Keenadu, a new Android malware, has been discovered embedded in device firmware and distributed via app stores, infecting thousands of devices worldwide. The backdoor enables remote control for ad fraud and is linked to powerful botnets, exposing critical risks in the Android supply chain.
A dangerous new Android malware, 'Keenadu,' has been discovered lurking in the firmware of tablets before they leave the factory, targeting thousands of users in Russia, Germany, and Japan. The backdoor enables attackers to take control, commit ad fraud, and evade detection, raising alarm over the security of the global tech supply chain.
Texas has filed a lawsuit against TP-Link, accusing the networking giant of enabling Chinese state-sponsored hackers to exploit security flaws in its routers. This feature examines the legal battle, the technical vulnerabilities, and the broader implications for cybersecurity and consumer trust.
Chinese state-backed hackers have exploited a critical Dell disaster recovery vulnerability, forcing U.S. agencies to patch systems urgently. The attack exposes the fragility of backup infrastructure and highlights a new frontier in cyber-espionage.
Insomnia ransomware has claimed AdMark Asia Group as its latest victim, exposing the vulnerabilities of leading executive search firms and raising questions about cyber resilience in Asia's business sector.
Elgon Cosmetic, a renowned Italian haircare manufacturer, has suffered a ransomware attack by the Spacebears group. Sensitive financial, customer, and proprietary data are at risk, signaling new cyber threats to the beauty industry.
Ransomware gangs are trading speed for stealth. 'Long load' attacks see hackers lurking undetected for weeks, stealing data and setting the stage for maximum extortion. Netcrook investigates the anatomy of this new cybercriminal strategy.
A&A Global Industries, a leading toy and candy distributor, has been targeted by the Akira ransomware gang. Sensitive employee data is at risk as the attackers threaten public exposure unless their demands are met.
Nightspire ransomware has targeted German automotive company KFZ Sauter GmbH Co. KG, exfiltrating 50GB of data in a high-stakes cyberattack. Here’s what we know so far.
Cybercrime group Ransomhouse has published internal data allegedly stolen from the Warren County Sheriff’s Office in Kentucky, highlighting vulnerabilities in law enforcement cybersecurity and the growing threat to public-sector agencies.
Nightspire ransomware has claimed American Piping & Boiler Co. as its latest victim, highlighting serious risks to the U.S. industrial supply chain. Here’s what we know about the attack and its broader implications.
A new ransomware group, OBerk, is shaking up the cybercrime scene with bold extortion methods and a wide range of victims. Netcrook examines the group's rise, tactics, and the ongoing hunt to unmask its operators.
On February 18, 2026, the University of Mannheim was named as the latest victim of the Qilin ransomware group. This cyberattack underscores the growing threat facing academic institutions worldwide.
Dragonforce has struck CCR Solutions, combining ransomware tactics with invasive doxxing. The group leaked explicit images of the CEO, marking a new and troubling escalation in cyber extortion.