

Poland officials confirm Russia was behind coordinated attempt to trigger nationwide blackout
Notorious ‘Sandworm’ unit targeted renewables and heating plants with new 'Dynowiper' malware during record cold. Polish officials and security researchers have confirmed that Russia’s military intelligence agency (the GRU) was behind a massive, coordinated attempt to trigger a nationwide blackout in Poland during the final days of 2025. Described by Digital Affairs Minister Krzysztof Gawkowski as the "largest attack on energy infrastructure in years," the assault utilized a


The WhatsApp and Gmail of 800+ key figures in the middle east hacked in major cyber espionage campaign
The campaign targets diplomats, journalists, and officials using zero-click exploits and social engineering. A sophisticated cyber espionage campaign has successfully breached the WhatsApp and Gmail accounts of more than 800 high-profile individuals across the Middle East, including senior government officials, academics, and business leaders. The discovery, first raised as an "urgent security alert" by U.K.-based activist Nariman Gharib, reveals a multi-layered attack design


Varonis researchers discover new method to bypass Microsoft Copilot and steal user data
Dubbed Reprompt Attack, the method allows single-click exfiltration of sensitive user data. Security researchers at Varonis Threat Labs have uncovered a dangerous new attack vector dubbed "Reprompt," which weaponizes Microsoft Copilot against its own users. By clicking a single, legitimate-looking Microsoft link, a user can inadvertently trigger an invisible chain of events that allows an attacker to harvest sensitive information, ranging from recent file summaries to the use


Cybersecurity predictions 2026: key risks and insights
Experts warn machine-speed threats, deepfake extortion and supply chain chaos will define the new year. The year 2026 is set to be a watershed moment for cybersecurity, defined by the convergence of Artificial Intelligence, identity fraud, and global geopolitical tension. Industry forecasts indicate that cybercrime has shifted from human-paced operations to machine-speed, autonomous attacks, forcing security teams to abandon traditional defense playbooks and fully commit to A


North Korean hackers using malicious QR codes to bypass corporate defenses
FBI warns that Kimsuky, a North Korean hacker outfit, is using quishing to lure targets. The North Korean state-sponsored hacking group Kimsuky (also tracked as APT43) has significantly adapted its spear-phishing tactics, deploying malicious QR codes (quishing) to breach the defenses of high-value targets. The U.S. Federal Bureau of Investigation (FBI) has issued a flash alert, warning that this technique is specifically designed to bypass traditional email security controls
































