WhatsApp Malware Attack: What You Need to Know

Microsoft is warning about a new cyberattack where hackers are using WhatsApp messages to trick people into infecting their computers with malware. This campaign began around February 2026 and mainly targets Windows users by sending harmful files that look like normal attachments. The goal is to get someone to open the file so the attack […]

Apple Releases Security Updates for Older Devices to Fix Serious Vulnerabilities

Apple has released new security updates specifically for older iPhones and iPads to fix dangerous flaws that hackers have been actively using to break into devices. These issues were part of a sophisticated attack method that allowed cybercriminals to secretly gain access to personal data, including sensitive information like messages, accounts, and even digital wallets. […]

FortiGate Devices Exploited in Attacks to Breach Networks and Steal Credentials

Cybersecurity researchers have uncovered a new wave of attacks in which threat actors are exploiting FortiGate firewall devices as entry points into targeted networks. These devices, commonly used to secure enterprise environments, are being abused to gain unauthorized access, allowing attackers to infiltrate organizations across sectors such as healthcare, government, and managed service providers. The […]

Security Flaws in Claude Code Raise Risk of Data Theft and System Takeover

Security researchers have identified serious vulnerabilities in Anthropic’s Claude Code tool that could expose developers to major cyber risks, including stolen data and full system compromise. The flaws stem largely from how the AI-powered coding assistant interacts with configuration files and external project environments, which attackers can manipulate to execute malicious actions. In some cases, […]

Spyware iPhone Toolkit, Extortion Emails, and Major Phishing Platform Takedown

Security researchers have discovered a powerful iPhone hacking toolkit that may be used by espionage groups and cybercriminals. The toolkit, known as Coruna, contains several exploit chains capable of targeting older versions of Apple’s iOS operating system. Researchers found that the framework can identify the type of iPhone and operating system being used, then deliver […]