US Army soldier pleads guilty to hacking telcos and extortion

Cameron Wagenius had already pleaded guilty to other charges earlier this year.

Security News | TechCrunch – ​Read More

AI Is Reshaping How Attorneys Practice Law

Experts recommend enhanced AI literacy, training around the ethics of using AI, and verification protocols to maintain credibility in an increasingly AI-influenced courtroom.

darkreading – ​Read More

Lessons Learned From McDonald’s Big AI Flub

McDonald’s hiring platform was using its original default credentials and inadvertently exposed information belonging to approximately 64 million job applicants.

darkreading – ​Read More

Meta fixes bug that could leak users’ AI prompts and generated content

The tech giant fixed the security flaw, netting a security researcher $10,000 for privately disclosing the bug.

Security News | TechCrunch – ​Read More

The FBI’s Jeffrey Epstein Prison Video Had Nearly 3 Minutes Cut Out

Metadata from the “raw” Epstein prison video shows approximately 2 minutes and 53 seconds were removed from one of two stitched-together clips. The cut starts right at the “missing minute.”

Security Latest – ​Read More

AsyncRAT Spawns Concerning Labyrinth of Forks

Since surfacing on GitHub in 2019, AsyncRAT has become a poster child for how open source malware can democratize cybercrime, with a mazelike footprint of variants available across the spectrum of functionality.

darkreading – ​Read More

Google says ‘Big Sleep’ AI tool found bug hackers planned to use

On Tuesday, Google said Big Sleep managed to discover CVE-2025-6965 — a critical security flaw that Google said was “only known to threat actors and was at risk of being exploited.”

The Record from Recorded Future News – ​Read More

Attackers Hide JavaScript in SVG Images to Lure Users to Malicious Sites

Beware! SVG images are now being used with obfuscated JavaScript for stealthy redirect attacks via spoofed emails. Get insights from Ontinue’s latest research on detection and defence.

Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto – ​Read More

Attackers Abuse AWS Cloud to Target Southeast Asian Governments

The intelligence-gathering cyber campaign introduces the novel HazyBeacon backdoor and uses legitimate cloud communication channels for command-and-control (C2) and exfiltration to hide its malicious activities.

darkreading – ​Read More

Ukrainian hackers claim to have destroyed servers of Russian drone maker

A coalition of Ukrainian hackers breached and wiped systems belonging to Gaskar Group, a Moscow-based drone maker.

Security News | TechCrunch – ​Read More