Data
FBI servers were hacked and a data breach might have occurred
The Federal Bureau of Investigation (FBI), one of the primary law enforcement and intelligence agencies of the United States, has officially acknowledged that a limited number of its servers were compromised by external actors earlier this year. According to the agency, the breach occurred during the second week of February and was detected on February […]
Trump DOJ Voter Data demand triggers breach concerns across many states
Governments, regardless of which political party is in power, often argue that they possess the legal authority to request voter registration data from state election boards as part of broader citizenship verification efforts. The central objective behind such initiatives is to safeguard electoral integrity and ensure that only eligible citizens participate in the democratic process. […]
Ransomware attack makes customer file lawsuit against SonicWall Firewall Vulnerability
A major legal battle is unfolding after a ransomware incident involving SonicWall has prompted one of its customers to file suit over a firewall vulnerability that allegedly exposed sensitive data. What Happened? According to reports, the Akira Ransomware gang targeted SonicWall’s backup server infrastructure, stealing customer-related data during an attack that took place between July […]
Lapsus Ransomware group targets Adidas
Adidas, a German sportswear giant has once again found itself in the spotlight, but this time for troubling cybersecurity concerns rather than business performance. The company, which is reportedly being considered for acquisition by Nike in October 2027, has allegedly become the latest target of a notorious ransomware group. The hacking collective known as Lapsus$ […]
Ransomware Attacks on schools diminished in the year 2025
Ransomware attacks targeting schools showed a slight numerical decline in 2025, but the overall threat to student and institutional data remained significant. According to the “Education Ransomware Roundup” report released by Comparitech, cybercriminals launched more than 251 ransomware attacks against educational institutions in 2025. While this figure represents only a modest change compared to the […]
Ransomware hackers say NO to Data Exfiltration and YES to Encryption
Ransomware operators appear to be recalibrating their tactics, with a noticeable shift away from large-scale data exfiltration and toward a renewed emphasis on file encryption. According to a study conducted by incident response firm Coveware, only well-established cybercriminal syndicates—such as Clop, LockBit 3.0, and Qilin—continue to systematically employ “double extortion” strategies. In double extortion campaigns, […]
Over 65% of UK healthcare data is leaked in small data security incidents
More than 65 percent of healthcare data in the United Kingdom is exposed through a surprisingly small number of security incidents, highlighting serious weaknesses in data protection across the sector. According to recent findings, just 11 percent of reported data security breaches are responsible for most of the leaked healthcare information, putting millions of patient […]
European Commission investigates Data Breach of Staff
The European Commission has come under the spotlight in recent days after reports emerged that it had fallen victim to a cybersecurity breach involving employee-related data. The incident has drawn widespread media attention, raising concerns about data protection and institutional cybersecurity at one of the European Union’s most prominent bodies. According to initial reports, hackers […]
Signs that a Large Language Model LLM has been compromised with backdoor Malware
As large language models (LLMs) become more deeply integrated into enterprise systems, developer tools, and decision-making pipelines, they also become attractive targets for malicious actors. One particularly dangerous threat is a backdoored LLM—a model that appears to function normally but has been subtly manipulated to behave maliciously under specific conditions. Detecting such compromises is challenging, […]














