A hacker group from China posing as a cybersecurity firm has allegedly stolen 7 million dollars via wallet supply‑chain attacks, targeting Trust Wallet and other clients before an internal dispute triggered a whistleblower leak. Summary Operating under Wuhan Anshun Technology, the group presented itself as a security outfit while allegedly using Electron apps, browser plugins,...Read More
John Magee Gavin, 35, a Brookline resident and former Boston science teacher, has been sentenced to 10 years in federal prison for an online child exploitation scheme that stretched across state and national borders. On Thursday, March 12, 2026, in federal court in Boston, he was ordered to serve the decade-long term followed by five...Read More
A lot of making goes on in this community these days, but sometimes you’ve just gotta do some old fashioned hacking. You might have grabbed an old Speak and Spell that you want to repurpose as an interface for a horrifyingly rude chatbot, or you’ve got a calculator that is going to become the passcode keypad...Read More
On 16 January 2023, the NIS2 Directive came into force. Member States are now in the process of transposing this important piece of cybersecurity legislation into their national law. This task must be completed by 17 October 2024 and, from 18 October 2024, the current NIS Directive will be repealed and Member States will apply...Read More
MANCHESTER, Iowa — Authorities in Manchester are working hard to protect children from online predators with an initiative known as Operation Castle. The undercover operation, which began in September 2025, has already resulted in the arrest of more than a dozen suspects. Operation Castle involves an undercover officer targeting predators online using public and dark...Read More
Security researchers have identified a suite of powerful hacking tools capable of compromising iPhones running older software that they say has passed from a government customer into the hands of cybercriminals. Google said Tuesday that it first identified the exploit kit, dubbed Coruna, in February 2025 during a surveillance vendor’s attempt to hack into someone’s...Read More
Posted: Mar 17, 2026 7:06 AM CDT Updated: Mar 17, 2026 9:17 AM CDT by Justin Walker BY JAMEY TUCKER, Consumer Tech Reporter Your WiFi router may be the most overlooked device in your home. It quietly connects your TVs, phones, laptops, doorbells, and every other smart gadget to the internet. But to hackers, that...Read More
A school psychologist snared in an undercover sting targeting suspected sexual predators in the Inland Empire, where he allegedly sought personal contact with an individual whom he thought was a teenager, pleaded not guilty Tuesday to felony charges. Paul Ryan Coleman, 46, of Yucaipa was arrested last week following a three-month investigation by the Riverside...Read More
More details on suspected China-nexus actors quietly establishing years-long access to the networks of military organizations in Southeast Asia have come to light. In a threat report last week, Palo Alto Networks’ Unit 42 incident response team detailed how it uncovered an extensive cyber espionage campaign, which it attributed with moderate confidence to Chinese state-sponsored...Read More
ST. LOUIS (First Alert 4) – The former St. Louis Post-Dispatch building on North Tucker is drawing a growing list of technology companies and nonprofits, positioning downtown St. Louis as an emerging hub for geospatial, defense tech and cybersecurity industries. The eight-floor building has around 160,000 square feet of rentable space, along with large event...Read More