Latest Internet & Cybersecurity News
Operation PowerOFF Seizes 53 DDoS Domains, Disrupts 75,000 Cybercriminals
An international law enforcement operation dismantled 53 domains and arrested four individuals connected to commercial DDoS-for-hire services. The operation exposed databases containing over 3 million criminal user accounts and disrupted access to technical infrastructure used by more than 75,000 cybercriminals, with authorities issuing 25 search warrants and sending warning communications to identified users
.
ShinyHunters Exploits Salesforce Misconfiguration, Breaches McGraw Hill and Rockstar Games
The ShinyHunters threat group exposed a critical weakness in cloud system configurations rather than software vulnerabilities, compromising McGraw Hill's Salesforce environment and triggering data leaks of millions of personal records. The breach represents a significant shift toward exploiting operational gaps in cloud infrastructure, with attackers setting ransom deadlines and demonstrating how misconfigured portals enable large-scale data exfiltration
.
White House Unveils Action-Oriented National Cyber Strategy
The White House's Office of the National Cyber Director unveiled a new action-focused cybersecurity strategy centered on six pillars beginning with deterring adversaries. The approach aims to impose costs on attackers and strengthen protections for American victims, directly addressing transnational criminal organizations and cybercriminals targeting U.S. citizens' financial data and personal information
.
FIRST Concludes CVE/VulnCon 2026 with 500+ Global Security Leaders
The Forum of Incident Response and Security Teams successfully concluded a four-day summit in Scottsdale, Arizona, drawing over 500 attendees to address CVE quality, AI security, and coordinated disclosure. The conference advanced key vulnerability management milestones and brought together global security leaders to tackle emerging threats
.
Mean Time to Exploit Plummets to Hours Amid AI-Driven Vulnerability Discovery
Cybersecurity community leaders report that the mean time to exploit vulnerabilities has collapsed from weeks to mere hours due to AI automation. FIRST CEO Chris Gibson emphasized the need for global CVE collaboration and integrating AI companies as Numbering Authorities to stabilize the vulnerability management ecosystem amid the unprecedented explosion of security flaws
.
NBLock Ransomware Identified Targeting Windows Systems with AES-256 Encryption
Researchers identified NBLock ransomware, a file-encrypting malware strain designed to restrict access to victim data by appending the '.NBLock' extension. The malware enumerates local files and network-accessible storage, applying AES-256 encryption and targeting Windows OS, local file systems, and network shares
.
Gunra Ransomware Emerges as Double-Extortion Threat Targeting Five Nations
Gunra, a sophisticated double-extortion ransomware group that emerged in April 2025, leverages leaked Conti code and primarily targets Brazil, South Korea, the United States, Spain, and Canada. The group focuses on Professional Goods & Services, Healthcare, Consumer Goods & Services, Manufacturing, and Finance sectors with advanced encryption and evasion capabilities
.
Iranian APT Activity Continues Despite Ceasefire with U.S.
Despite reports of a U.S.-Iran ceasefire, security experts warn that Iranian-affiliated Advanced Persistent Threats continue actively compromising critical infrastructure. While the IRGC-linked group 'Handala' announced a temporary pause in targeting the U.S., intelligence reports indicate ongoing threats from Iranian state-sponsored actors
.
Hacker Breaches Chinese State Supercomputer, Exfiltrates 10 Petabytes
A threat actor using the alias 'FlamingChina' claimed responsibility for breaching a Chinese state-run supercomputer at the National Supercomputing Center in Tianjin. The attacker allegedly exfiltrated over 10 petabytes of highly sensitive information from the facility
.
Anthropic Releases Claude Opus 4.7 and Mythos Model Amid Security Concerns
Anthropic released Claude Opus 4.7 and its Mythos model, which sparked global cybersecurity concerns among regulators and financial institutions due to its ability to detect critical software flaws. The advanced AI capability raises questions about potential misuse for identifying exploitable vulnerabilities in critical systems
.
Emerson Partners with OPSWAT for Operational Technology Patch Management
Emerson has partnered with OPSWAT to embed operational technology patch management capabilities into the Ovation platform for critical infrastructure protection. The integration aims to strengthen cybersecurity defenses for industrial control systems by improving vulnerability remediation workflows
.