top of page
All Posts


Meta to Shut Down Instagram End-to-End Encrypted Chat Support Starting May 2026
Not every security risk comes from a vulnerability or active exploitation. Sometimes, risk emerges from the removal of protections users have come to rely on. Meta Platforms has announced that it will discontinue end-to-end encrypted (E2EE) chats in Instagram direct messages starting May 8, 2026 which is a move that marks a significant shift in how user communications are secured on the platform. End-to-end encryption has long been considered one of the strongest safeguards f
akid95
4 days ago3 min read


Hackers Exploit CVE-2025-32975 (CVSS 10.0) to Hijack Unpatched Quest KACE SMA Systems
Not all breaches begin with phishing emails or exposed endpoints. Sometimes, the most dangerous entry point is the system designed to manage everything else. A critical vulnerability, CVE-2025-32975, has been actively exploited in the Quest KACE Systems Management Appliance (SMA), a widely used platform for endpoint administration and software deployment. With a maximum CVSS score of 10.0, the flaw allows unauthenticated attackers to bypass authentication and gain full admini
akid95
4 days ago3 min read


Key MDR Use Cases: How MDR Protects Your Business from Advanced Threats
Managed Detection and Response (MDR) enables organizations to rapidly detect, investigate, and respond to a wide range of cyber threats including those that often bypass traditional security controls. By combining advanced technology with human expertise, MDR provides deep visibility across endpoints, networks, and cloud environments, allowing security teams to identify suspicious activity early and take decisive action before threats escalate. Below are some of the most crit
akid95
4 days ago2 min read


Meta Disables 150K Accounts Linked to Southeast Asia Scam Centers in Global Crackdown
A large-scale international operation has targeted organized cyber scam networks operating through social media, resulting in the removal of more than 150,000 fraudulent accounts linked to criminal groups in Southeast Asia. The action was carried out by Meta Platforms in collaboration with global law enforcement agencies. The enforcement effort took place during a coordinated initiative known as Joint Disruption Week, which involved organizations including the Royal Thai Poli
akid95
Mar 123 min read


FortiGate Devices Exploited to Breach Networks and Steal Service Account Credentials
Cybersecurity researchers have reported multiple intrusions where attackers compromised FortiGate devices to gain unauthorized access to corporate networks and extract sensitive internal information. These appliances, developed by Fortinet, are widely used as next-generation firewalls and VPN gateways that sit at the network edge, making them a critical component of enterprise security infrastructure. Incident responders observed that attackers deliberately targeted these per
akid95
Mar 112 min read


Do You Need a vCISO? Here’s Why Many Organizations Do
As cyber threats continue to grow in sophistication and frequency, organizations are under increasing pressure to strengthen their cybersecurity leadership. However, many businesses operate without a dedicated Chief Information Security Officer (CISO) due to the high cost and resource commitment of hiring a full-time executive. Without strategic security leadership, organizations often struggle to align their cybersecurity initiatives with business goals, manage risks effecti
akid95
Mar 101 min read


Iran-Linked MuddyWater Hackers Target U.S. Networks With New Dindoor Backdoor
Cybersecurity researchers have uncovered a targeted cyber-espionage campaign conducted by the Iran-linked threat group MuddyWater, which has infiltrated multiple organizations across the United States and allied countries. The operation targeted sectors considered strategically significant, including financial institutions, aviation infrastructure, non-profit organizations, and a software company connected to the defense and aerospace industry. The activity highlights how sta
akid95
Mar 105 min read


Mail2Shell Zero-click Attack Lets Hackers Hijack FreeScout Mail Servers
Not all critical vulnerabilities rely on stolen credentials or exposed admin panels. Sometimes, the most damaging flaws are hidden inside automated workflows that organizations trust every day. A critical zero-click remote code execution vulnerability affecting FreeScout, tracked as CVE-2026-28289, demonstrates exactly that risk. The flaw allows attackers to achieve unauthenticated remote command execution simply by sending a specially crafted email to a mailbox connected to
akid95
Mar 54 min read


CISA Flags VMware Zero-Day Exploited by China-Linked Hackers in Active Attacks
Not all critical vulnerabilities begin with a remote exploit. Sometimes, the most dangerous flaws are the ones attackers use after they are already inside. A high-severity vulnerability affecting VMware environments, tracked as CVE-2025-41244, has been confirmed as actively exploited in the wild. The issue impacts VMware Aria Operations and VMware Tools in environments where the Software-Defined Management Platform (SDMP) is enabled. The U.S. Cybersecurity and Infrastructure
akid95
Mar 43 min read


Why Monitoring Alone Isn’t Enough: MSSP vs. MDR Explained
Many organizations assume that partnering with an MSSP automatically means they are fully protected but monitoring alone is no longer enough in today’s threat landscape. A Managed Security Service Provider (MSSP) primarily focuses on deploying, managing, and monitoring security tools such as SIEM, firewalls, and endpoint solutions. Their services are largely automated and portal-driven, generating alerts and notifying your team when suspicious activity is detected. While this
akid95
Mar 42 min read


New Chrome Vulnerability Let Malicious Extensions Escalate Privileges via Gemini Panel
The rise of AI-integrated browsers has introduced new convenience and new risks. In early 2026, researchers from Palo Alto Networks Unit 42 and multiple cybersecurity outlets disclosed a high-severity vulnerability in Google Chrome’s Gemini Live AI assistant, tracked as CVE-2026-0628. The flaw allowed seemingly low-permission extensions to bypass Chrome’s built-in privilege boundaries, giving attackers access to sensitive system resources like files, camera, microphone, and s
akid95
Mar 33 min read


Trojanized Gaming Tools Spread Java-Based RAT via Browser and Chat Platforms
The traditional image of malware distribution which is mass phishing emails or exploit kits targeting enterprise infrastructure is evolving. In recent reporting from multiple cybersecurity outlets including The Hacker News and News4Hackers, researchers have identified a campaign spreading trojanized gaming utilities embedded with a Java-based Remote Access Trojan (RAT), often referred to in analysis as SteaElite RAT. Rather than exploiting software vulnerabilities directly, t
akid95
Mar 23 min read


CarGurus Data Breach Exposes Information of 12.4 Million Accounts
In early 2026, reports began circulating across cybersecurity circles about a major data breach affecting CarGurus, one of the world’s largest online automotive marketplaces. While early estimates varied, disclosures suggested that millions of user records may have been exposed, with figures ranging from roughly 12 million to well over 100 million accounts. Such inconsistencies are common in the early stages of breach investigations, yet the underlying concern remained clear
akid95
Feb 253 min read


Ad tech firm Optimizely confirms data breach after vishing attack
The Optimizely incident is a powerful reminder that not all cyberattacks begin with malicious code or technical exploits. In this case, the breach reportedly originated from a voice phishing or “vishing” attack, where deception over the phone became the gateway to unauthorized access. Rather than targeting software weaknesses, the attackers targeted something far more universal and difficult to defend. The event underscores a growing reality in cybersecurity which is organiza
akid95
Feb 243 min read


Ukrainian National Sentenced to 5 Years in North Korea IT Worker Fraud Case
The Laptop Farm That Fooled Corporate America A recent U.S. criminal case has shed light on a strikingly modern form of fraud which is one that did not involve breaking into networks or deploying sophisticated malware. Instead, the scheme revolved around trust, identity, and the mechanics of remote work. According to law-enforcement disclosures, a Ukrainian national was sentenced in the United States for operating what investigators described as a “laptop farm,” a setup desig
akid95
Feb 233 min read


INTERPOL Operation Red Card 2.0 Arrests 651 in African Cybercrime Crackdown
The biggest cyber threats across Africa are not always dramatic hacks or Hollywood-style breaches. Between late 2025 and early 2026, authorities across 16 African countries carried out a sweeping crackdown known as Operation Red Card 2.0, targeting something far more common which is online scams. Coordinated by INTERPOL, the operation exposed how modern fraud rings operate less like technical masterminds and more like highly organized deception businesses. Instead of attackin
akid95
Feb 203 min read


Microsoft Discloses DNS-Based ClickFix Attack Using Nslookup for Malware Staging
Microsoft and other security leaders sounded the alarm on a dangerous evolution of the ClickFix campaign. This tactic, which first appeared in 2024, tricks users into manually running malicious commands under the guise of "fixing" a website error or passing a security check. The latest version is far more aggressive and harder to spot which is it doesn't just wait for an error to happen and it creates one. By intentionally crashing a user's browser, hackers create a moment o
akid95
Feb 193 min read


AI Platforms can be Abused as Malware C2 Proxies
Security researchers uncovered a groundbreaking new threat called "AI-in-the-Middle." For years, we worried that hackers might use AI to write better phishing emails; now, they are using the AI itself as a secret communication tunnel. By exploiting the way AI assistants like Microsoft Copilot or Grok can browse the live web to summarize links, hackers have found a way to hide their malicious activity. Because these AI services are trusted and used by almost every major compa
akid95
Feb 193 min read


First Malicious Outlook Add-In Found Stealing 4,000+ Microsoft Credentials
In early February 2026, a new kind of digital trap was discovered hidden right inside Microsoft Outlook. Known as "AgreeToSteal," this campaign involved a once-popular scheduling tool called "AgreeTo" that had been abandoned by its creator. Because the original developer stopped paying for the website that powered the app, a clever hacker stepped in and bought the web address. Since the app was still officially listed in the Microsoft Store and trusted by Outlook, the hacker
akid95
Feb 132 min read


JokerOTP Platform With 28,000+ Phishing Attacks Dismantled
In a massive win for global security, an international police task force dismantled JokerOTP in April 2025. This wasn't just a group of hackers; it was a "crime-as-a-service" supermarket that sold high-tech tools to everyday criminals. By the time it was shut down, the platform had powered over 28,000 attacks across 13 countries, stealing roughly $9.5 million USD from unsuspecting victims. The crackdown led to the arrests of key masterminds in the UK and the Netherlands, but
akid95
Feb 123 min read
bottom of page
