Your Private Files Weren’t Private: Inside the Fiverr Data Exposure That Shocked Users

A serious data exposure involving Fiverr has raised alarms after sensitive user files—including tax forms, contracts, IDs, and login credentials—were discovered publicly accessible through Google search results. The issue appears to stem from how files were stored and shared on the platform, rather than a traditional “hack,” but the consequences are just as concerning for […]

108 Chrome Extensions Turned Into A Data Heist

A massive and coordinated malware campaign has exposed just how dangerous seemingly harmless browser add-ons can be. Security researchers have identified 108 malicious Chrome extensions that were secretly stealing sensitive user data, hijacking sessions, and injecting harmful scripts, all while posing as useful everyday tools. At first glance, these extensions appeared legitimate. They advertised features […]

WhatsApp Malware Attack: What You Need to Know

Microsoft is warning about a new cyberattack where hackers are using WhatsApp messages to trick people into infecting their computers with malware. This campaign began around February 2026 and mainly targets Windows users by sending harmful files that look like normal attachments. The goal is to get someone to open the file so the attack […]

Apple Releases Security Updates for Older Devices to Fix Serious Vulnerabilities

Apple has released new security updates specifically for older iPhones and iPads to fix dangerous flaws that hackers have been actively using to break into devices. These issues were part of a sophisticated attack method that allowed cybercriminals to secretly gain access to personal data, including sensitive information like messages, accounts, and even digital wallets. […]

FortiGate Devices Exploited in Attacks to Breach Networks and Steal Credentials

Cybersecurity researchers have uncovered a new wave of attacks in which threat actors are exploiting FortiGate firewall devices as entry points into targeted networks. These devices, commonly used to secure enterprise environments, are being abused to gain unauthorized access, allowing attackers to infiltrate organizations across sectors such as healthcare, government, and managed service providers. The […]