Cyber Security News

Start. Stay. Grow.

Curated daily. The latest hacks, breaches, and cyber trends—humanized.

Around the Web

Last Updated: N/A

Hacker icon

Hacks + Heists

Iranian hackers claim breach of FBI director Kash Patel's personal email account

Handala, a pro-Iranian hacking group allegedly working for Iran's government, published over 300 emails and photos from FBI Director Kash Patel's pers...

Read more →

Dark Web Market Lists Alleged 375TB Lockheed Martin Data for $600M - Hackread

A hacker is selling hacked database of BitcoinTalk.org, a Bitcoin forum ... Hacking News with full-scale reviews on Crypto and Technology trends.

Read more →

FBI Confirms $10 Million Reward After Iran Hacks Kash Patel's Gmail - Forbes

Who Are the Iran-Linked Handala Gmail Hackers? Researchers from the Sophos Counter Threat Unit have confirmed that the Handala Hack Team is an Iran- ....

Read more →

Hackers, barns, and breakfast: Why agriculture needs cybersecurity - Dal News

Hackers, barns, and breakfast: Why agriculture needs cybersecurity · Securing agricultural technologies · Real environments, not simulations.

Read more →

The European Commission got hacked for the second time this year - Mashable

The hackers also said they will not attempt to extort the EC for the stolen data but will leak it online "at a later date." SEE ALSO: U.S. government ...

Read more →
Cybersecurity icon

Big Cyber

Axios Supply Chain Attack Pushes Cross-Platform RAT via Compromised npm Account

The popular HTTP client Axios suffered a supply chain attack after malicious versions of the npm package introduced a malicious dependency delivering ...

Read more →

Russian CTRL Toolkit Delivered via Malicious LNK Files Hijacks RDP via FRP Tunnels

Cybersecurity researchers have discovered a remote access toolkit of Russian-origin that's distributed via malicious Windows shortcut (LNK) files ...

Read more →

Axios Supply Chain Attack Pushes Cross-Platform RAT via Compromised npm Account

In switching the package manifests, the idea is to avoid raising any red flags during post-infection inspection of the package. Cybersecurity. " ...

Read more →

ChatGPT Data Leakage via a Hidden Outbound Channel in the Code Execution Runtime

Check Point Research discovered that sensitive data shared with ChatGPT could be silently exfiltrated through a hidden DNS communication path without ...

Read more →
Technology icon

Hard Tech

React2Shell (CVE-2025-55182)

A 10.0 critical severity vulnerablility affecting server-side use of React.js, tracked as CVE-2025-55182 in React.js and CVE-2025-66478 specifically f...

Read more →

Breaking Into a Brother (MFC-J1010DW): Three Security Flaws in a Seemingly Innocent Printer

We discovered three vulnerabilities that when chained together, allow for complete remote compromise:

Read more →

Check Point - Wrong Check Point (CVE-2024-24919)

Gather round, gather round - it’s time for another blogpost tearing open an SSLVPN appliance and laying bare a recent in-the-wild exploited bug. This ...

Read more →

Backdoor in XZ Utils allows RCE: everything you need to know - CVE-2024-3094

Detect and mitigate CVE-2024-3094, a critical supply chain compromise, affecting XZ Utils Data compression library. Organizations should patch urgentl...

Read more →

Loading...

The Cybersecurity Chronicles

‘The Cybersecurity Chronicles: 2024‘ pulls back the curtain on the digital threats that shaped our world last year, revealing the human stories behind the headlines. From art galleries frozen by ransomware to prison tablets hacked with a minus sign, from British Library archivists racing to protect centuries of knowledge to Spotify users meticulously curating their digital identities – these stories illuminate how cybersecurity touches every aspect of modern life.

Author Mark Nole weaves together intimate portraits of the people on all sides of the digital battlefield: the defenders working through sleepless nights to protect critical infrastructure, the victims grappling with stolen identities and lost savings, and even the attackers themselves, operating from nondescript offices with project management software and performance metrics.

Through detailed reporting and narrative storytelling, Nole reveals how 2024 became the year when cybersecurity stopped being just a technical problem and emerged as a fundamentally human challenge. Whether you’re a security professional or simply someone trying to understand our increasingly digital world, these chronicles offer an unprecedented look at how technology shapes – and sometimes betrays – our trust, our privacy, and our lives.

Mark Nole Book Cover for Cybersecurity book

Stay Updated with Cyber Security News

Get the latest cybersecurity headlines, breaking news, and expert insights delivered directly to your inbox. Stay ahead of threats and informed about the digital landscape.

Join thousands of cybersecurity professionals and enthusiasts. No spam, just valuable insights.