Edtech Firm Instructure Discloses Data Breach Amid Hacker Leak Threats

Hackers disrupted services and stole names, email addresses, student ID numbers, and user messages.

The post Edtech Firm Instructure Discloses Data Breach Amid Hacker Leak Threats appeared first on SecurityWeek.

SecurityWeek – ​Read More

Global Crackdown Arrests 276, Shuts 9 Crypto Scam Centers, Seizes $701M

A coordinated international operation involving U.S. and Chinese authorities has arrested at least 276 suspects and shut down nine scam centers used for cryptocurrency investment fraud schemes targeting Americans, resulting in millions of dollars in losses.
The crackdown was led by the Dubai Police, under the United Arab Emirates (UAE) Ministry of Interior, in partnership with the U.S. Federal

The Hacker News – ​Read More

I tracked 3,000 steps on my Apple Watch, Google Pixel, and Oura Ring – this one was most accurate

Just how reliable is that smartwatch or smart ring? I tested three of the most popular health trackers to find out.

Latest news – ​Read More

This ‘cardputer’ sits between the Raspberry Pi and Flipper Zero – but it’s uniquely better

The M5Stack Cardputer Adv is a self-contained pocket computer with plenty of promise.

Latest news – ​Read More

Paying Ransom Won’t Help as VECT 2.0 Ransomware Destroys Data Irreversibly

VECT 2.0 ransomware contains fatal flaws that permanently destroy files, making recovery impossible and rendering ransom payments useless for victims worldwide.

Hackread – Cybersecurity News, Data Breaches, AI and More – ​Read More

US Military Reaches Deals With 7 Tech Companies to Use Their AI on Classified Systems

Google, Microsoft, Amazon Web Services, Nvidia, OpenAI, Reflection and SpaceX will provide resources to help augment warfighter decision-making in complex operational environments,” the Defense Department said.

The post US Military Reaches Deals With 7 Tech Companies to Use Their AI on Classified Systems appeared first on SecurityWeek.

SecurityWeek – ​Read More

I upgraded my Bluetooth speakers instead of replacing them – 5 creative ways

You don’t have to shell out hundreds (or thousands) of dollars on smart speakers for a robust home entertainment setup.

Latest news – ​Read More

CISA Adds Actively Exploited Linux Root Access Bug CVE-2026-31431 to KEV

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added a recently disclosed security flaw impacting various Linux distributions to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation in the wild.
The vulnerability, tracked as CVE-2026-31431 (CVSS score: 7.8), is a case of local privilege escalation (LPE) flaw that could allow an

The Hacker News – ​Read More

Why I own 4 different pairs of headphones, and how I effectively use each one

While a true ‘all-in-one’ pair of headphones may not exist for every user, these four come pretty close.

Latest news – ​Read More

Google AppSheet Exploited in 30,000-User Facebook Phishing Operation

Scammers are abusing Google AppSheet and Google Drive to bypass security filters and steal thousands of Facebook Business accounts globally.

Hackread – Cybersecurity News, Data Breaches, AI and More – ​Read More