A UMMC cyberattack has disrupted operations at the largest academic health science center in Jackson, Mississippi. The incident forced the shutdown of critical information technology systems, the closure of clinics across the state, and the cancellation of numerous medical procedures. Hospital officials show more ...
confirmed Thursday that multiple IT systems, including the electronic medical records platform, were taken offline following a cyberattack on UMMC. As a result, outpatient and ambulatory surgeries and procedures, along with imaging appointments, were canceled. All UMMC clinics statewide were also closed, leaving providers unable to access patients’ digital medical records. Despite the widespread outages, services for patients already inside UMMC hospitals have continued under what administrators described as “downtime procedures,” which allow medical staff to provide care without relying on electronic systems. The University of Mississippi Medical Center employs more than 10,000 people, serves over 70,000 patients annually, and operates 35 clinics across Mississippi. Given its size and reach, the UMMC cyberattack has had an immediate and far-reaching impact. Emergency Response Activated After Cyberattack on UMMC During a recent press conference, UMMC leaders said they activated their emergency operations plans in response to the cyberattack on UMMC. Federal authorities are assisting in the investigation, including the Federal Bureau of Investigation, the United States Department of Homeland Security, and the Cybersecurity and Infrastructure Security Agency. Officials revealed that the attackers “have communicated to us,” adding that the medical center is working with authorities to determine the next steps. As a precaution, administrators shut down all IT systems. In a second statement, UMMC officials said: “UMMC clinics statewide will again be closed tomorrow, Friday, Feb. 20, and elective procedures are cancelled. Appointments will be rescheduled. One exception is the dialysis clinic at the Jackson Medical Mall, which is operational and open for scheduled appointments.” The dialysis clinic is located at the Jackson Medical Mall. Officials added that the disruption caused by the UMMC cyberattack is expected to be a multi-day event. Hospitals and Emergency Departments will remain open unless otherwise communicated. In-person classes are continuing as scheduled, though online classes were canceled Feb. 20. “We are sorry for this disruption, and we are working diligently to restore our systems and services as soon as possible,” UMMC officials said. Patient Data Concerns Following UMMC Cyberattack The cyberattack on UMMC has raised concerns about the potential exposure of sensitive patient information. Because UMMC is the largest hospital system in the state, the effects could extend well beyond Jackson. James Phipps, a cybersecurity expert who works with medical facilities across Mississippi, explained how incidents like the UMMC cyberattack can unfold. “They’re attacking your firewall, they’re looking for any vulnerabilities. If you have an employee on staff who opens up an e-mail, spam e-mail, they can get in that way. There are several different attack vectors that hackers use,” Phipps said. According to Phipps, cybercriminals are often less interested in clinical data such as X-rays or blood test results and more focused on personal identifying information tied to medical records. “They’re going after their demographic data most of the time,” Phipps continued. “So they can have billing records, social security numbers, all of that they can use elsewhere to, you know, change their identity, steal your identity.” How the University of Mississippi Medical Center’s Interconnected System Could Be Affected The structure of healthcare delivery in Mississippi adds another layer of concern. Hospitals and clinics frequently exchange patient information through referrals, meaning the impact of the UMMC cyberattack could ripple across interconnected systems. “In Mississippi, the hospitals and clinics can be interconnected. You have referrals. A doctor can refer you to a doctor who’s a specialist, and the referring clinic may have information about that patient that’s being transferred back and forth,” Phipps explained. As investigators work to determine what specific information, if any, was breached in the cyberattack on UMMC, patients are being advised to monitor their financial accounts. Phipps recommended checking bank statements for unusual charges and reporting suspicious activity immediately. At this stage, officials have not disclosed the full scope of the breach or confirmed whether patient data was accessed. The University of Mississippi Medical Center continues working with federal authorities to investigate the UMMC cyberattack and restore affected systems. Further updates are expected as more details become available.
Artificial intelligence is no longer a future-facing concept; it is actively reshaping cyber risk, regulatory enforcement, and enterprise security strategy in real time. This week’s The Cyber Express weekly roundup reflects the modern environment where AI-driven fraud, deepfake investigations, ransomware show more ...
incidents, and mobile malware innovations are unfolding simultaneously across multiple regions. From corporate boardrooms and government summits to underground phishing networks and regulatory corridors in Europe, the developments covered in this The Cyber Express weekly roundup highlight that cybersecurity and AI governance are now inseparable. As organizations race to innovate, regulators and threat actors are moving just as quickly, forcing businesses to confront operational, legal, and systemic challenges all at once. The Cyber Express Weekly Roundup AI-Driven Ad Fraud Blurs Line Between Marketing and Cybersecurity In an interview featured in The Cyber Express weekly roundup, Mike Schrobo, CEO of Fraud Blocker, warned that some “high-performing” ad campaigns are actually driven by malware and AI-powered bot networks. He highlighted the rise of distributed “ghost click farms” that closely mimic real users, turning what was once a marketing issue into a serious cybersecurity threat. Read more... UK Warns SMEs: Size Does Not Shield Against Cyberattacks The National Cyber Security Centre warned small and medium-sized enterprises not to assume they were “too small” to be targeted. CEO Richard Horne emphasized that attackers target weaknesses, not company size, and that inaction is the biggest risk. Read more... AI Governance Takes Center Stage at India AI Impact Summit 2026 At the India AI Impact Summit 2026, leaders warned that scaling AI without strong governance could increase systemic risk. Beenu Arora of Cyble called for aggressive AI “red teaming” amid rising deep-fake scams. Sundar Pichai and Dario Amodei warned of widening AI divides and rapidly advancing capabilities, while N. Chandrasekaran and António Guterres urged to treat AI as critical infrastructure. Read more... Ireland Launches GDPR Probe into X Over Grok Deepfakes In Europe, Ireland’s Data Protection Commission has launched a GDPR investigation into X over its Grok AI chatbot’s alleged creation of nonconsensual sexualized deepfakes, including images involving children. As X’s lead EU regulator, the DPC can impose fines of up to 4% of global revenue if violations are confirmed. Read more... Ransomware Investigation at Advantest Japan-based Advantest Corporation confirmed a cybersecurity incident after detecting unusual network activity on February 15, with early signs pointing to possible ransomware deployment. The company has isolated affected systems and brought in external specialists to assess containment, data impact, and potential operational or financial consequences. Read more... Weekly Takeaway This edition of The Cyber Express weekly roundup highlights how AI innovation, regulatory enforcement, and cybercrime evolution are unfolding simultaneously. As enterprises expand digital capabilities, attackers and regulators are adapting just as quickly. The consistent message across this The Cyber Express weekly roundup is clear: governance, proactive monitoring, and real-time validation must evolve in parallel with technological progress. Without that balance, the risks will scale just as rapidly as the innovation itself.
The India AI Impact Summit 2026 opened with a clear and urgent message from global technology leaders: artificial intelligence is evolving at a pace that is outstripping the world’s ability to regulate, govern, and secure it. At the high-level inaugural session held at Bharat Mandapam in New Delhi and inaugurated by show more ...
the Prime Minister of India, Narendra Modi, Big Tech CEOs and global policymakers highlighted both the transformative potential of AI and the growing need for Responsible AI at Scale. Unlike earlier global AI forums that largely celebrated innovation breakthroughs, the India AI Impact Summit 2026 marked a noticeable shift toward deeper concerns around risk, access, governance, and long-term societal impact—signaling that AI is no longer just a technology conversation, but a global policy and security priority. Sundar Pichai Flags Risk of an “AI Divide” as Technology Accelerates One of the key moments from the summit came from Google CEO Sundar Pichai, who described artificial intelligence as a turning point comparable to the biggest technology shifts of the past few decades. Speaking about the pace of change, he pointed to AI’s potential to help emerging economies move faster in areas like science, infrastructure, and digital services. “AI is the biggest platform shift of a lifetime. We are on the cusp of hyper progress and new discoveries that can help emerging economies leapfrog legacy gaps.” [caption id="attachment_109694" align="aligncenter" width="600"] Image Source: PIB[/caption] At the same time, Pichai warned that these benefits will not reach everyone automatically. He stressed that unequal access to advanced AI systems and computing resources could widen existing technology gaps between nations. “We cannot allow the digital divide to become an AI divide.” His remarks highlighted a growing concern across the tech industry: the countries that control AI infrastructure and large-scale models may also shape the future economic advantages of the AI era. Dario Amodei Warns AI Could Surpass Human Cognitive Capability Soon One of the most remarkable observations at the India AI Impact Summit 2026 came from Dario Amodei, CEO of Anthropic, who emphasized the exponential pace of AI development. “AI has been on an exponential trend for the last 10 years, and we are now well advanced on that curve.” He suggested that AI systems may soon outperform humans across most domains. [caption id="attachment_109696" align="aligncenter" width="677"] Image Source: PIB[/caption] “We are increasingly close to what I’ve called a ‘country of geniuses in the data centre’, a set of AI agents more capable than most humans at most things.” While highlighting benefits such as disease research and economic transformation, Amodei also warned that rapid capability growth introduces systemic risks. “That level of capability brings extraordinary opportunities… but it also brings serious risks.” His remarks reinforced a central theme of the summit—AI capability is accelerating faster than AI governance. Chandrasekaran Positions AI as Next National Infrastructure Layer From an industry deployment perspective, N. Chandrasekaran, Chairman of Tata Sons, framed AI as the next foundational infrastructure comparable to electricity or the internet. [caption id="attachment_109699" align="aligncenter" width="685"] Image Source: PIB[/caption] “AI is the next big infrastructure. It is the infrastructure of intelligence.” He emphasized that the real challenge is ensuring AI accessibility at scale. “We should put AI tools in the hands of the last person of the country.” His statement aligned closely with India’s broader push toward democratized AI deployment across sectors such as healthcare, agriculture, and public services. Global Leaders Stress AI Governance and Strategic Independence Beyond technology executives, global political leadership also used the India AI Impact Summit 2026 platform to underline governance concerns. António Guterres, Secretary-General of the United Nations, warned against concentration of AI power. “The future of AI cannot be decided by a handful of countries or left to the whims of a few billionaires.” He called for a Global Fund on AI to support developing economies. Meanwhile, Emmanuel Macron stressed that AI sovereignty will shape geopolitical balance. “The smartest AI is not the most expensive. It is the one built by the best people and for the right purpose.” Deepfake Risks and Need for AI Red Teaming While global CEOs discussed capability growth, the panel on Responsible AI at Scale shifted attention to emerging cyber risks. Beenu Arora, Co-Founder and CEO of Cyble, emphasized that organizations must actively test AI systems before deploying them. “I think my final take is based upon how I started my career, which was trying to hack them on a penetration test.” “For enterprises or any academia, I think red teaming — which is basically trying to hack your AI infrastructure, AI models, or AI assumptions… is going to be most critical.” [caption id="attachment_109693" align="aligncenter" width="600"] Image Source: Cyble[/caption] He also highlighted the rapid rise of deepfake-enabled fraud. “On average, we are seeing around 70 to 100 thousand new deepfake audio calls in our systems.” These examples underscored a key takeaway from the India AI Impact Summit 2026—AI is no longer just transforming productivity; it is also reshaping cyber threats. India AI Impact Summit 2026 Reflects Shift From AI Innovation to AI Accountability The India AI Impact Summit 2026 made it clear that while artificial intelligence is advancing rapidly, the bigger challenge now is how it is managed and used responsibly. Throughout the discussions, global technology leaders spoke about the opportunities AI can bring, but they also acknowledged the risks that are already beginning to surface. Warnings from leaders like Sundar Pichai and Dario Amodei showed that AI is no longer just about innovation—it is about access, control, and security. At the same time, cybersecurity experts highlighted how threats such as deepfakes and AI-driven fraud are becoming more common, making stronger safeguards essential. What stood out at the India AI Impact Summit 2026 was the balanced message: AI has the potential to transform economies and industries, but without proper governance and cyber readiness, the risks could grow just as fast as the technology itself. As AI continues to expand into everyday systems and critical sectors, the focus is clearly shifting. The real success of AI will not only depend on how powerful the technology becomes, but on how safely, fairly, and responsibly it is deployed.
Two petabytes, or two quadrillion bytes of information, has been stolen from Israelis in recent years, according to Yossi Karadi, head of the Israel National Cyber Directorate (INCD). Speaking to The Jerusalem Post, Karadi described the scope of the Israel data breach incidents as unprecedented. Not long ago, show more ...
cyberattacks were measured in megabytes or gigabytes. As digital storage expanded, breaches involving terabytes, trillions of bytes, became the benchmark for large-scale incidents. Now, hackers have pushed beyond even that threshold. The two-petabyte figure reflects a dramatic leap in the scale of successful infiltrations affecting Israeli citizens and institutions. Yossi Karadi Says the Israel Data Breach Reached Quadrillions To understand the magnitude, Karadi compared the stolen volume to the holdings of the National Library of Israel, whose digital archive totals roughly 20 trillion bytes. The cumulative data taken in various Israel data breach cases equals about 100 such libraries. The estimate is based on aggregated intelligence assessments and data analysis from multiple cyber incidents tracked by the INCD. Beyond raw data theft, officials are also tracking sharp increases in specific forms of cyber aggression. According to figures presented during the interview, phishing attacks in 2025 climbed by 35%, while cyber influence operations surged by 170%. The Israel data breach problem, therefore, is only one part of a broader and more complex digital threat environment. Phishing attacks rely heavily on social engineering. Attackers attempt to manipulate individuals into clicking on malicious links or providing sensitive financial details. In some cases, these tactics allow criminals to drain bank accounts or harvest personal information. In others, they serve as an entry point into larger organizational networks, potentially opening the door to more extensive breaches. Cyber Influence Surge Deepens Israel Data Breach Concerns Cyber influence campaigns are structured differently. Rather than stealing money or information directly, they aim to manipulate public opinion to achieve political or strategic objectives. One widely known example remains Russia’s documented attempt to interfere in the 2016 presidential election in the United States. Although subsequent investigations concluded that Donald Trump likely would have won regardless, the episode demonstrated how digital influence efforts can disrupt democratic discourse. In Israel, authorities have raised concerns about similar tactics. Last week, the INCD and the Shin Bet issued a public warning revealing that, since mid-2025, hundreds of highly sophisticated cyberattacks have targeted Israeli government officials, security personnel, academics, and media figures. Much of the spike in activity has been attributed to intelligence elements from Iran, though officials stress that Israel faces threats from multiple sources. Israel is currently ranked as the third most targeted country worldwide by hackers. Still, it is far from alone in experiencing large-scale digital disruption. In August and September 2025, Jaguar Land Rover in the United Kingdom suffered one of the most economically damaging cyberattacks on record. The breach caused nearly £2 billion in losses and forced a month-long shutdown across its global production facilities. Supply chains involving up to 5,000 businesses were disrupted for five weeks, and the British government intervened to stabilize operations while the company regained its financial footing. Push for Cyber Law as Data Breaches Escalate In response to the growing threat landscape and the recurring Israel data breach incidents, Karadi has advanced a comprehensive cyber law designed to clarify the INCD’s authority and formalize the responsibilities of private-sector operators. The proposed legislation, introduced on January 25, outlines 63 minimum cybersecurity requirements for critical infrastructure providers and government agencies. Many of these standards draw from frameworks established by the National Institute of Standards and Technology. A central provision of the bill would require companies facing “grave” cyber threats to report breaches to the INCD in real time. The goal is to enable faster coordination and containment before incidents escalate into large-scale national crises. Karadi, who assumed his role approximately a year ago, is seeking to advance the bill’s first reading in the Knesset in March. If the legislative process moves quickly, it could be enacted before the upcoming election season begins by mid-summer.
French national bank authority confirmed a major data breach affecting 1.2 million bank accounts after a malicious actor stole credentials belonging to a government official and used them to access the national bank account file. The Directorate General of Public Finances detected the intrusion in late January 2026 show more ...
and immediately restricted access to limit data extraction from FICOBA, the comprehensive database listing every bank account opened in French banking establishments. The attacker compromised credentials of an official authorized to access FICOBA through interministerial information exchange channels. This legitimate access pathway allowed the threat actor to query the database without triggering immediate alarms, demonstrating how credential theft enables attackers to masquerade as trusted insiders and bypass perimeter security controls. FICOBA contains sensitive personal data including bank account details such as RIB and IBAN numbers, account holder identities, addresses and in some cases tax identification numbers. The database serves as France's central registry for tracking financial accounts, making it a high-value target for criminals seeking identity theft material, financial fraud opportunities or intelligence on French taxpayers. Also read: France Alleges ‘Foreign Interference’ After RAT Malware Found on Ferry The Directorate General of Public Finances has not disclosed the intrusion's duration before detection, the specific method attackers used to steal official credentials, or whether multi-factor authentication protected the compromised accounts. The ministry stated it implemented immediate access restrictions upon discovering the incident to halt the attack and prevent additional unauthorized access. Work continues to restore service with enhanced security controls, though the ministry provided no timeline for full remediation. Affected users will receive individual notifications in coming days alerting them that attackers may have accessed their data. The breach notification follows European Union General Data Protection Regulation requirements mandating timely disclosure when personal data breaches occur. The ministry contacted French banking institutions to coordinate customer awareness campaigns emphasizing the need for increased vigilance against financial fraud and identity theft. Compromised bank account details enable various attack vectors including targeted phishing campaigns, account takeover attempts and fraudulent transaction initiation. The ministry reported the incident to the National Commission for Information Technology and Civil Liberties, France's data protection authority equivalent to other European Union supervisory bodies. CNIL will investigate whether the Directorate General of Public Finances implemented adequate security measures to protect FICOBA data and may impose penalties if violations of data protection law occurred. Authorities also filed a formal criminal complaint, initiating law enforcement investigation into the breach. French prosecutors will attempt to identify the threat actor, determine whether the breach connects to organized cybercrime groups or nation-state operations, and pursue criminal charges if suspects are located. Citizens whose accounts appear in FICOBA should monitor bank statements for unauthorized transactions, watch for suspicious communications claiming to be from financial institutions or government agencies, and report any fraud attempts to authorities immediately. The stolen data creates long-term identity theft risks that may persist for years after the initial breach. Also read: France Arrests 22-Year-Old Suspect in Ministry of the Interior Cyberattack
Most phishing websites are little more than static copies of login pages for popular online destinations, and they are often quickly taken down by anti-abuse activists and security firms. But a stealthy new phishing-as-a-service offering lets customers sidestep both of these pitfalls: It uses cleverly disguised links show more ...
to load the target brand’s real website, and then acts as a relay between the target and the legitimate site — forwarding the victim’s username, password and multi-factor authentication (MFA) code to the legitimate site and returning its responses. There are countless phishing kits that would-be scammers can use to get started, but successfully wielding them requires some modicum of skill in configuring servers, domain names, certificates, proxy services, and other repetitive tech drudgery. Enter Starkiller, a new phishing service that dynamically loads a live copy of the real login page and records everything the user types, proxying the data from the legitimate site back to the victim. According to an analysis of Starkiller by the security firm Abnormal AI, the service lets customers select a brand to impersonate (e.g., Apple, Facebook, Google, Microsoft et. al.) and generates a deceptive URL that visually mimics the legitimate domain while routing traffic through the attacker’s infrastructure. For example, a phishing link targeting Microsoft customers appears as “login.microsoft.com@[malicious/shortened URL here].” The “@” sign in the link trick is an oldie but goodie, because everything before the “@” in a URL is considered username data, and the real landing page is what comes after the “@” sign. Here’s what it looks like in the target’s browser: Image: Abnormal AI. The actual malicious landing page is blurred out in this picture, but we can see it ends in .ru. The service also offers the ability to insert links from different URL-shortening services. Once Starkiller customers select the URL to be phished, the service spins up a Docker container running a headless Chrome browser instance that loads the real login page, Abnormal found. “The container then acts as a man-in-the-middle reverse proxy, forwarding the end user’s inputs to the legitimate site and returning the site’s responses,” Abnormal researchers Callie Baron and Piotr Wojtyla wrote in a blog post on Thursday. “Every keystroke, form submission, and session token passes through attacker-controlled infrastructure and is logged along the way.” Starkiller in effect offers cybercriminals real-time session monitoring, allowing them to live-stream the target’s screen as they interact with the phishing page, the researchers said. “The platform also includes keylogger capture for every keystroke, cookie and session token theft for direct account takeover, geo-tracking of targets, and automated Telegram alerts when new credentials come in,” they wrote. “Campaign analytics round out the operator experience with visit counts, conversion rates, and performance graphs—the same kind of metrics dashboard a legitimate SaaS [software-as-a-service] platform would offer.” Abnormal said the service also deftly intercepts and relays the victim’s MFA credentials, since the recipient who clicks the link is actually authenticating with the real site through a proxy, and any authentication tokens submitted are then forwarded to the legitimate service in real time. “The attacker captures the resulting session cookies and tokens, giving them authenticated access to the account,” the researchers wrote. “When attackers relay the entire authentication flow in real time, MFA protections can be effectively neutralized despite functioning exactly as designed.” The “URL Masker” feature of the Starkiller phishing service features options for configuring the malicious link. Image: Abnormal. Starkiller is just one of several cybercrime services offered by a threat group calling itself Jinkusu, which maintains an active user forum where customers can discuss techniques, request features and troubleshoot deployments. One a-la-carte feature will harvest email addresses and contact information from compromised sessions, and advises the data can be used to build target lists for follow-on phishing campaigns. This service strikes me as a remarkable evolution in phishing, and its apparent success is likely to be copied by other enterprising cybercriminals (assuming the service performs as well as it claims). After all, phishing users this way avoids the upfront costs and constant hassles associated with juggling multiple phishing domains, and it throws a wrench in traditional phishing detection methods like domain blocklisting and static page analysis. It also massively lowers the barrier to entry for novice cybercriminals, Abnormal researchers observed. “Starkiller represents a significant escalation in phishing infrastructure, reflecting a broader trend toward commoditized, enterprise-style cybercrime tooling,” their report concludes. “Combined with URL masking, session hijacking, and MFA bypass, it gives low-skill cybercriminals access to attack capabilities that were previously out of reach.”
As scaled-down circuits with limited functions redefine computing for AI systems and autonomous vehicles, their flexibility demands new approaches to safeguard critical infrastructure.
Researchers say threat actors wielded the sophisticated — and unfortunately named — toolkit to target high-value networks for React2Shell exploitation.
Microsoft Copilot recently summarized and leaked user emails; but any AI agent will go above and beyond to complete assigned tasks, even breaking through their carefully designed guardrails.
After two years of finding flaws in AI infrastructure, two Wiz researchers advise security pros to worry less about prompt injection and more about vulnerabilities.
The company said it detected unusual activity within its IT environment on Sunday and activated incident response protocols and isolated the impacted systems.
The National Bank of Ukraine announced that attackers may have gained access to users’ personal data, including names, phone numbers, email addresses and delivery addresses, in a recent cyberattack.
A Ukrainian man was sentenced to five years in U.S. prison for his years-long role in a scheme that helped North Koreans get illegally hired in IT roles at 40 American companies.
Elon Musk’s social media platform X has filed an appeal at the European Union’s General Court challenging a €120 million ($141 million) fine imposed by the European Commission.
Russia’s intensifying cyberattacks, sabotage and covert influence operations across Europe show the Kremlin is preparing for a prolonged confrontation with the West, Dutch intelligence agencies said.
Two former Google engineers and one of their husbands have been indicted in the U.S. for allegedly committing trade secret theft from the search giant and other tech firms and transferring the information to unauthorized locations, including Iran. Samaneh Ghandali, 41, and her husband Mohammadjavad Khosravi (aka Mohammad Khosravi), 40, along with her sister Soroor Ghandali, 32, have been accused
The U.S. Federal Bureau of Investigation (FBI) has warned of an increase in ATM jackpotting incidents across the country, leading to losses of more than $20 million in 2025. The agency said 1,900 ATM jackpotting incidents have been reported since 2020, out of which 700 took place last year. In December 2025, the U.S. Department of Justice (DoJ) said about $40.73 million has been collectively
In yet another software supply chain attack, the open-source, artificial intelligence (AI)-powered coding assistant Cline CLI was updated to stealthily install OpenClaw, a self-hosted autonomous AI agent that has become exceedingly popular in the past few months. "On February 17, 2026, at 3:26 AM PT, an unauthorized party used a compromised npm publish token to publish an update to Cline CLI
Cybersecurity researchers have disclosed details of a new ClickFix campaign that abuses compromised legitimate sites to deliver a previously undocumented remote access trojan (RAT) called MIMICRAT (aka AstarionRAT). "The campaign demonstrates a high level of operational sophistication: compromised sites spanning multiple industries and geographies serve as delivery infrastructure, a multi-stage
With one in three cyber-attacks now involving compromised employee accounts, insurers and regulators are placing far greater emphasis on identity posture when assessing cyber risk. For many organizations, however, these assessments remain largely opaque. Elements such as password hygiene, privileged access management, and the extent of multi-factor authentication (MFA) coverage are
A 29-year-old Ukrainian national has been sentenced to five years in prison in the U.S. for his role in facilitating North Korea's fraudulent information technology (IT) worker scheme. In November 2025, Oleksandr "Alexander" Didenko pleaded guilty to wire fraud conspiracy and aggravated identity theft for stealing the identities of U.S. citizens and selling them to IT workers to help them land
Threat actors have been observed exploiting a recently disclosed critical security flaw impacting BeyondTrust Remote Support (RS) and Privileged Remote Access (PRA) products to conduct a wide range of malicious actions, including deploying VShell and The vulnerability, tracked as CVE-2026-1731 (CVSS score: 9.9), allows attackers to execute operating system commands in the context of the
Spain's police force has announced that it has arrested a 20-year-old man who they claim managed to book luxury hotel rooms worth up to €1,000 a night for just one euro cent. Read more in my article on the Hot for Security blog.