[ad_1] A hacking group with a history of compromising major global corporations said it had stolen nearly 80 million business records from video game developer Rockstar Games, the maker of Grand Theft Auto. The claim was posted to the website used by the ShinyHunters hacking group on Saturday, according to data collected by cybercrime research...Read More
[ad_1] Giving early-career employees meaningful exposure to AI-related work is therefore essential. Threat modelling, AI governance reviews, vendor assessments and forensics exercises are all emerging areas new talent can contribute to immediately. In an AI-driven environment—where threats are changing, tooling is changing, and even the definition of “user” is changing—that mindset matters. If we remove...Read More
[ad_1] Indian enterprises could be facing a structural cybersecurity risk after the release of the advanced AI model Mythos by Anthropic. As Mythos begins finding software vulnerabilities in hours, far faster than companies can fix them, experts said this could leave systems exposed, especially in sectors like banking and telecom that rely on older systems....Read More
[ad_1]
Greenland Energy Company (NASDAQ: GLND) announced placement in an editorial by NetworkNewsWire highlighting global energy security risks and the value of new supply frontiers. The company said it is advancing exploration in Greenland’s Jameson Land Basin, citing potential for a substantial oil resource and plans to drill key wells....Read More
[ad_1] Summary On April 12, 2026, the ransomware group Dragonforce announced a cyberattack againstAffordable Oil, a key player in the U.S. oil sector. The attackers have threatened to release sensitive data unless the company initiates negotiations. Incident Report Field Details Target Affordable Oil Domain N/A Country USA Attacking Group Dragonforce Date Reported April 12, 2026...Read More
[ad_1] Scholar argues that denying access to online platforms does more harm than good to minors. Amid growing concern over children’s online safety, policymakers worldwide have increasingly introduced regulations restricting minors’ access to online content. Some jurisdictions, such as Australia, prohibit minors from accessing certain social media. Others, such as Texas, require age verification before...Read More
[ad_1] A man convicted of kidnapping and rapes starting in 1980 is eligible for release but won’t be placed in Santa Cruz County because of community opposition, the District Attorney’s Office said Friday. Michael Thomas Cheek, now 74, was convicted in 1980 and 1981 of sexual assaults in Santa Cruz and Lake counties and was...Read More
[ad_1] Fast-Moving Ransomware, Router-Based Espionage Threats Target Education and Small-Office Organizations A recent report from Microsoft warns about two active cybersecurity threats: a fast-moving ransomware campaign and a Russian espionage operation that abuses small office and home office routers to monitor victims’ network traffic. The company said this week that the Storm-1175 threat group is...Read More
[ad_1] The silence from the executive suite at Rockstar Games is as calculated as the code that drives their multi-billion dollar titles. Following reports that the studio behind the Grand Theft Auto franchise has once again been infiltrated by unauthorized actors, the company has deployed a playbook of containment and dismissal, characterizing the incident as...Read More
[ad_1] Federal investigators in Atlanta say they’ve shut down a global cybercrime operation that used fake websites to steal thousands of usernames and passwords and fuel millions of dollars in fraud. The FBI Atlanta Field Office announced the takedown as part of what officials called a first-of-its-kind joint investigation with Indonesian authorities. At the center...Read More