Latest Internet & Cybersecurity News
Cybersecurity Agencies Warn of China-Linked Covert Networks for Espionage
Global agencies including CISA and NCSC-UK issued an advisory on China-nexus actors building botnets from compromised SOHO routers and IoT devices for all phases of cyber attacks. These dynamic networks evade traditional defenses like IP blocklists and are managed by Chinese firms like Integrity Technology Group behind Flax Typhoon.
Organizations urged to implement zero trust, dynamic threat feeds, and traffic baselining.
LMDeploy CVE-2026-33626 Exploited in Under 13 Hours for Cloud Credential Theft
A high-severity SSRF flaw in LMDeploy LLM toolkit (versions <=0.12.0) was exploited within 12 hours 31 minutes of disclosure, targeting vision language models. Attackers from IP 103.116.72.119 conducted internal scanning and credential theft via honeypots.
This highlights rapid weaponization of AI infrastructure vulnerabilities.
Hackers Abuse Compromised Routers to Build China-Linked Cyber Infrastructure
China-linked threat actors hijack routers and edge devices worldwide to create hidden networks blending malicious traffic with normal activity. Multiple groups share these evolving botnets, causing 'IOC extinction' and enabling data exfiltration.
NCSC advisory recommends mapping edge traffic and enforcing 2FA, zero trust controls.
Regulators Scrutinize Anthropic's Mythos Over Banking Cyber Risks
Global regulators and banks assess cyber risks from Anthropic's Mythos after unauthorized access; India Finance Ministry convenes bank CEOs. Vulnerabilities in Indian payment systems heighten risks from LLM-enabled attacks like social engineering and malware.
U.S., Canada, UK officials also engaging banking leaders for containment measures.
Canada Life Investigates Cybersecurity Data Breach Impacting Customers
Canada Life is probing a cybersecurity incident potentially exposing personal data of thousands of customers. The company posted a statement on its website confirming the investigation.
Details on breach scope and affected data types remain under review.
AI Accelerates State-Sponsored Cybersecurity Threats Globally
State cyber operations integrate AI for persistent, scalable attacks, outpacing defenders over past three years. Shifts emphasize automation, economic pressure on ransomware havens, and pre-crisis cyber coordination with private sector.
Cyber embedded in national security strategies worldwide.
US Targets Global Crypto Scam Ring from Myanmar in Cybersecurity Crackdown
US authorities target international crypto scam operations originating from Myanmar amid rising cyber threats. Part of broader efforts against state and criminal cyber activities.
Highlights intersection of cybercrime and financial security.