Lenovo ThinkPad vs. Apple MacBook: Which is the better laptop for you?

The PC vs. Mac debate might never be solved, but how does the ThinkPad compare to the MacBook?

Latest news – ​Read More

Dust Specter Targets Iraqi Officials with New SPLITDROP and GHOSTFORM Malware

A suspected Iran-nexus threat actor has been attributed to a campaign targeting government officials in Iraq by impersonating the country’s Ministry of Foreign Affairs to deliver a set of never-before-seen malware.
Zscaler ThreatLabz, which observed the activity in January 2026, is tracking the cluster under the name Dust Specter. The attacks, which manifest in the form of two different

The Hacker News – ​Read More

62 people indicted by Taiwanese prosecutors over ties to cyber scam company Prince Group

The Taipei District Prosecutors Office initiated its investigation in October after Chen Zhi, the founder of the Prince Group, was indicted by U.S. prosecutors on money laundering charges.

The Record from Recorded Future News – ​Read More

Get the iPhone 17e for $6 a month at AT&T – here’s how

Apple’s budget smartphone got a refresh with the just-announced iPhone 17e, and right now at AT&T, you can save big when you preorder on any Unlimited mobile plan.

Latest news – ​Read More

The biggest AI threats come from within – 12 ways to defend your organization

The gravest AI-powered threat to your cybersecurity isn’t coming from external hackers. Review these strategic recommendations for handling the risks from within.

Latest news – ​Read More

How a Music Streaming CEO Built an Open-Source Global Threat Map in His Spare Time

Frustrated by fragmented war news, Anghami’s Elie Habib built World Monitor, a platform that fuses global data, like aircraft signals and satellite detections, to track conflicts as they unfold.

Security Latest – ​Read More

Cisco Patches Critical Vulnerabilities in Enterprise Networking Products

Cisco has rolled out patches for 48 vulnerabilities in Firewall ASA, Secure FMC, and Secure FTD products.

The post Cisco Patches Critical Vulnerabilities in Enterprise Networking Products appeared first on SecurityWeek.

SecurityWeek – ​Read More

FBI and Europol Seize LeakBase Forum Used to Trade Stolen Credentials

A joint law enforcement operation has dismantled LeakBase, one of the world’s largest online forums for cybercriminals to buy and sell stolen data and cybercrime tools.
The LeakBase forum, per the U.S. Department of Justice (DoJ), had over 142,000 members and more than 215,000 messages between members as of December 2025. Those attempting to access the forum’s website (“leakbase[.]la”) are now

The Hacker News – ​Read More

Europol-Led Operation Takes Down Tycoon 2FA Phishing-as-a-Service Linked to 64,000 Attacks

Tycoon 2FA, one of the prominent phishing-as-a-service (PhaaS) toolkits that allowed cybercriminals to stage adversary-in-the-middle (AitM) credential harvesting attacks at scale, was dismantled by a coalition of law enforcement agencies and security companies.
The subscription-based phishing kit, which first emerged in August 2023, was described by Europol as one of the largest phishing

The Hacker News – ​Read More

Nation-State iOS Exploit Kit ‘Coruna’ Found Powering Global Attacks

Google and iVerify analysis reveals a powerful exploit kit originally used by Russian state actors that is now appearing in broader criminal campaigns.

The post Nation-State iOS Exploit Kit ‘Coruna’ Found Powering Global Attacks appeared first on SecurityWeek.

SecurityWeek – ​Read More