A cyberattack on the healthcare services provider ApolloMD in May 2025 resulted in the theft of personal and medical data belonging to over 626,000 patients. This article has been indexed from CyberMaterial Read the original article: ApolloMD Breach Impacts 626,540…
Odido Announces Data Breach
The Netherlands’ leading mobile provider, Odido, recently disclosed a major cyberattack that resulted in the theft of personal data from 6.2 million customers. This article has been indexed from CyberMaterial Read the original article: Odido Announces Data Breach
Ransomware Halts Payments For BTU Customers
Bryan Texas Utilities customers are entering their sixth day of payment disruptions following a ransomware attack on BridgePay, the utility’s third-party processor. This article has been indexed from CyberMaterial Read the original article: Ransomware Halts Payments For BTU Customers
Unzipping the Threat: How to Block Malware Hidden in Password-Protected ZIP Files
As malware evades detection by hiding inside password-protect zip files, new Threat Emulation capabilities enable inspecting and blocking malicious ZIP files without requiring their password. As cyber defenses evolve, so do attacker tactics. One of the most persistent evasion techniques…
Odido CRM Data Breach Exposes 6.2M Customer Records
A cyberattack on Odido’s CRM system exposed personal data from 6.2 million customers, though passwords and billing information were not affected. The post Odido CRM Data Breach Exposes 6.2M Customer Records appeared first on eSecurity Planet. This article has been…
How to find and remove credential-stealing Chrome extensions
Researchers have uncovered 30 Chrome extensions stealing user data. Here’s how to check your browser and remove any malicious extensions step by step. This article has been indexed from Malwarebytes Read the original article: How to find and remove credential-stealing…
IT Security News Hourly Summary 2026-02-13 15h : 7 posts
7 posts were published in the last hour 13:34 : Twisted 2D magnet creates skyrmions for ultra dense data storage 13:34 : Bitcoin trading firm CEO gets 20 years for operating $200 million Ponzi scheme 13:34 : Top Cybersecurity Job…
Twisted 2D magnet creates skyrmions for ultra dense data storage
As data keeps exploding worldwide, scientists are racing to pack more information into smaller and smaller spaces — and a team at the University of Stuttgart may have just unlocked a powerful new trick. By slightly twisting ultra-thin layers of…
Bitcoin trading firm CEO gets 20 years for operating $200 million Ponzi scheme
The U.S. Department of Justice sentenced the CEO of a multi level marketing and bitcoin trading firm to 20 years in prison after a conviction for wire fraud and money laundering tied to a large scale Ponzi scheme. Court records…
Top Cybersecurity Job Openings (January 2026)
Explore global cyber roles for Jan 2026: internships, junior & pro spots. Daily updates on remote/hybrid hiring in an AI-driven security market. This article has been indexed from CyberMaterial Read the original article: Top Cybersecurity Job Openings (January 2026)
Phishing Campaigns Target Users with Fake Meeting Invites and Update Alerts via Zoom, Teams, and Google Meet
An ongoing wave of phishing campaigns exploiting fake meeting invites from popular video conferencing platforms, including Zoom, Microsoft Teams, and Google Meet. The attacks use social engineering to lure corporate users into downloading malicious “software updates,” which are, in reality,…
New XWorm RAT Campaign Uses Themed Phishing Lures and CVE‑2018‑0802 Excel Exploit to Evade Detection
A new phishing campaign has been observed delivering an updated variant of XWorm, a Remote Access Trojan (RAT) that can give attackers full remote control of infected Microsoft Windows systems. First tracked in 2022, XWorm is still actively distributed and…
Zimbra Security Update – Patch for XSS, XXE & LDAP Injection Vulnerabilities
In a critical move for email server security, Zimbra released version 10.1.16 on February 4, 2026, tackling high-severity vulnerabilities including cross-site scripting (XSS), XML external entity (XXE), and LDAP injection. Labelled as high-patch severity and deployment risk, this update urges…
Check Point Announces Trio of Acquisitions Amid Solid 2025 Earnings Beat
Check Point has acquired Israeli cybersecurity companies Cyata, Cyclops, and Rotate. The post Check Point Announces Trio of Acquisitions Amid Solid 2025 Earnings Beat appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article: Check…
CVE-2025-64712 in Unstructured.io Puts Amazon, Google, and Tech Giants at Risk of Remote Code Execution
A newly disclosed critical flaw, CVE-2025-64712 (CVSS 9.8), in Unstructured.io’s “unstructured” ETL library could let attackers perform arbitrary file writes and potentially achieve remote code execution (RCE) on systems that process untrusted documents. Unstructured is widely used to convert messy business files…
Dutch Carrier Odido Discloses Data Breach Impacting 6 Million
Hackers stole personal information such as names, addresses, and phone numbers from a customer contact system. The post Dutch Carrier Odido Discloses Data Breach Impacting 6 Million appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the…
Malicious Chrome Extensions Caught Stealing Business Data, Emails, and Browsing History
Cybersecurity researchers have discovered a malicious Google Chrome extension that’s designed to steal data associated with Meta Business Suite and Facebook Business Manager. The extension, named CL Suite by @CLMasters (ID: jkphinfhmfkckkcnifhjiplhfoiefffl), is marketed as a way to scrape Meta…
Munich Security Conference: Cyber Threats Lead G7 Risk Index, Disinformation Ranks Third
G7 countries ranked cyber-attacks as the top risk, while BICS members placed cyber threats only as the eighth most pressing risk This article has been indexed from www.infosecurity-magazine.com Read the original article: Munich Security Conference: Cyber Threats Lead G7 Risk…
KnowBe4 Appoints Kelly Morgan as Chief Customer Officer to Drive Global Customer Lifecycle Strategy
KnowBe4 has announced the appointment of Kelly Morgan as its new Chief Customer Officer (CCO), reinforcing the company’s commitment to delivering measurable customer outcomes as it continues to expand in the Human and AI Risk Management market. Morgan will oversee…
Top Dutch telco Odido admits 6.2M customers caught in contact system caper
Names, addresses, bank account numbers accessed – but biz insists passwords and call data untouched The Netherlands’ largest mobile network operator (MNO) has admitted that a breach of its customer contact system may have affected around 6.2 million people.… This…
Static Design to Adaptive Control: How Artificial Intelligence Improves Modern Material Handling Equipment Systems
AI enables material handling systems to adapt to demand volatility through predictive design, dynamic control, and smarter maintenance without replacing core engineering. This article has been indexed from Hackread – Cybersecurity News, Data Breaches, AI and More Read the original…
The $17 Billion Wake-Up Call: Securing Crypto in the Age of AI Scams
AI-driven crypto scams surge as cybercrime hits $17B, with deepfakes, fraud kits, and industrial social engineering reshaping digital asset threats and defenses. This article has been indexed from Hackread – Cybersecurity News, Data Breaches, AI and More Read the original…
Google: state-backed hackers exploit Gemini AI for cyber recon and attacks
Google says nation-state actors used Gemini AI for reconnaissance and attack support in cyber operations. Google DeepMind and GTIG report a rise in model extraction or “distillation” attacks aimed at stealing AI intellectual property, which Google has detected and blocked.…
BeyondTrust Vulnerability Targeted by Hackers Within 24 Hours of PoC Release
Exploitation attempts target CVE-2026-1731, a critical unauthenticated remote code execution flaw in BeyondTrust Remote Support. The post BeyondTrust Vulnerability Targeted by Hackers Within 24 Hours of PoC Release appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…