Attackers Use Stolen AWS Credentials in Cryptomining Campaign

Threat actors wielding stolen AWS Identity and Access Management (IAM) credentials leverage Amazon EC and EC2 infrastructure across multiple customer environments.

darkreading – ​Read More

Google Maps just got its biggest upgrade in years, and it changes how you navigate (for the better)

Goodbye walls of text. Hello, rich visual guides that help you decide faster.

Latest news – ​Read More

Why I reach for this budget Android tablet over my iPad for entertainment now

The OnePlus Pad Go 2 has officially launched, and my experience with it thus far has been mostly positive. Mostly.

Latest news – ​Read More

This $700 OnePlus phone just embarrassed my Samsung Galaxy S25 Ultra’s battery

The OnePlus 15R has launched with specs that outpace its closest competitors – and more expensive rivals.

Latest news – ​Read More

NMFTA Warns of Surge and Sophistication of Cyber-Enabled Cargo Theft

The trucking industry group has released its 2026 Transportation Industry Cybersecurity Trends Report.

The post NMFTA Warns of Surge and Sophistication of Cyber-Enabled Cargo Theft appeared first on SecurityWeek.

SecurityWeek – ​Read More

France investigates Interior Ministry email breach and access to confidential files

France’s Interior Ministry said it is investigating the “reality and scope” of a post on a cybercrime forum by a user claiming to have hacked the institution.

The Record from Recorded Future News – ​Read More

New $150 Cellik RAT Grants Android Control, Trojanizes Google Play Apps

The malware provides full device control and real-time surveillance capabilities like those of advanced spyware.

The post New $150 Cellik RAT Grants Android Control, Trojanizes Google Play Apps appeared first on SecurityWeek.

SecurityWeek – ​Read More

Hacker Conversations: Alex Hall, One-time Fraudster

A first-person journey from undetected fraud to defending trust—how life events, neurodiversity, and hard-won insight shaped a former fraudster into a fraud fighter.

The post Hacker Conversations: Alex Hall, One-time Fraudster appeared first on SecurityWeek.

SecurityWeek – ​Read More

GhostPoster Firefox Extensions Hide Malware in Icons

The malware hijacks purchase commissions, tracks users, removes security headers, injects hidden iframes, and bypasses CAPTCHA.

The post GhostPoster Firefox Extensions Hide Malware in Icons appeared first on SecurityWeek.

SecurityWeek – ​Read More

Microsoft Will Finally Kill an Encryption Cipher That Enabled a Decade of Windows Hacks

The weak RC4 for administrative authentication has been a hacker holy grail for decades.

Security Latest – ​Read More