This is one of those Silicon Valley real-life episodes that seem pulled from the HBO satire show. This week, some really atrocious malware was discovered in an open source project developed by Y Combinator graduate LiteLLM. LiteLLM gives developers easy access to hundreds of AI models and provides features like spend management. It’s a breakout...
Read More
A multi-agency undercover operation in Nash County has led to the arrest of 16 people accused of attempting to prey on children online, with officials now releasing specific charges for each suspect. The North Carolina State Bureau of Investigation said the four-day operation took place in February in Nashville and involved more than 150 officers...
Read More
Earlier this year, an AI agent autonomously discovered a critical vulnerability in the Solana blockchain and earned a $400,000 bug bounty — the largest ever credited to an artificial intelligence. The agent wasn’t built by a tech giant. It was built by Kevin Wang and his team at Anatomist Security, a Web3 cybersecurity startup founded...
Read More
A powerful hacking tool capable of breaking into iPhones has been publicly leaked online, raising concerns among cybersecurity researchers that millions of devices could now be at greater risk. The tool, which builds on an exploit chain known as “DarkSword,” was previously observed in more limited, targeted attacks. Its recent publication on GitHub, reported by...
Read More
NEWS Michael Justus, one of the three former Plymouth-Canton Educational Park (P-CEP) students tied to a yearslong nude photo hacking scheme, appeared in federal court on Thursday for sentencing. He was sentenced to three years of probation, drawing audible sighs in the courtroom and disappointment from victims who had asked for jail time. “To say...
Read More
Picture a burglar who never sets foot in Whitehall. The miscreant doesn’t cruise our neighborhoods or test car doors under the cover of darkness, nor do they care about patrol routes or municipal boundaries. Instead, the thief sits behind a keyboard — perhaps overseas — targeting our residents with spoofed phone numbers, fake investment platforms...
Read More
Executive Summary What’s new: On March 6, 2026, President Trump issued an executive order directing federal agencies to develop an action plan to more aggressively combat transnational criminal organizations engaged in cybercrime targeting Americans. Why it matters: The order is part of a growing push to enlist the private sector in both investigation and disruption...
Read More
After a cyberattack by an Iranian-sponsored hacking group, an Israeli entrepreneur founded a company and raised $11 million in seed funding to address the vulnerabilities the hackers exploited. Onit Security, founded by Ofer Amitai, Elad Ben Meir, and Tom Winter, was created in response to an Iranian hacker group targeting Amitai’s previous company, with the...
Read More
Security leaders are warning about gaps in backup, recovery, and cyber resilience as World Backup Day approaches. Their comments reflect growing concern that modern IT environments are outpacing traditional data protection strategies. Senior security and technology executives from CrashPlan, Catalogic Software, and NetSPI said organisations face rising pressure as they modernise infrastructure and confront faster-moving...
Read More
Victims are first pulled in via GitHub issues that read, “Appreciate for your contributions on GitHub. We analyzed profiles and chose developers to get OpenClaw allocation.” The message is framed as a limited-time token giveaway of $5000 worth of CLAW tokens, directing them to collect the tokens by visiting the malicious site. “We assess that...
Read More
1 2 3 4 5 6 15
National Cyber Security

FREE
VIEW