Category: Security & Privacy

  • Cyberattack Disrupts Operations at Italy’s Largest University

    This article was generated by AI and cites original sources.

    La Sapienza University, one of Europe’s largest universities located in Rome, has faced a significant disruption as its computer systems remain offline for three days due to an alleged ransomware attack.

    The university, with approximately 120,000 students, took its systems offline as a precautionary measure following the cyberattack. While investigations are ongoing, efforts are being made to restore all digital services, although communication channels like email and workstations are only partially operational.

    Fortunately, the university had backups unaffected by the attack, aiding in the restoration process. However, the Sapienza website remains inaccessible at present.

    Reports suggest the disruption stems from a ransomware attack, with hackers allegedly demanding a ransom within a 72-hour countdown period. The incident is being investigated by Italy’s national cybersecurity agency, ACN, to determine the nature and impact of the attack.

    This cyber incident serves as a reminder of the vulnerabilities institutions face in the digital age, highlighting the importance of robust cybersecurity measures to safeguard critical infrastructure against malicious threats.

    Source: TechCrunch

  • Substack Data Breach Exposes User Information: What You Need to Know

    This article was generated by AI and cites original sources.

    Substack, the popular newsletter platform, has confirmed a data breach affecting its users’ email addresses and phone numbers. The breach, which occurred in October 2025 but was only discovered in early February, involved an unauthorized third party accessing user data, including internal metadata.

    However, Substack clarified that more sensitive information such as credit card details and passwords remained unaffected by the breach. The company’s CEO, Chris Best, reassured users that the security vulnerability has been addressed, and an investigation is underway to understand the extent of the breach.

    In an email to users, Best expressed apologies for the incident, emphasizing Substack’s commitment to data protection and privacy. Despite no evidence of data misuse so far, the company advised users to remain cautious with emails and texts.

    With a significant user base, Substack has become a prominent platform for content creators. The company’s recent funding of $100 million in July 2025 highlights its growth trajectory.

    Source: TechCrunch

  • Massive Data Breach at Conduent Exposes Millions to Cybersecurity Risks

    This article was generated by AI and cites original sources.

    A significant data breach at Conduent, a major government technology provider, has impacted millions of Americans, raising concerns about the security of personal information in the digital age. The ransomware attack, which disrupted Conduent’s operations for days, has now been revealed to affect over 15 million people in Texas alone, with additional victims in Oregon and other states. This breach has compromised individuals’ sensitive data, including names, Social Security numbers, medical records, and health insurance details, highlighting the vulnerabilities in data protection mechanisms.

    Conduent, known for managing vast amounts of personal and confidential data on behalf of government agencies and corporations, serves a significant portion of the U.S. population through its technology and operational services. The breach underscores the urgent need for robust cybersecurity measures in handling sensitive information and the potential risks associated with cyberattacks on large-scale data repositories.

    While Conduent has been working to assess the extent of the breach and identify the compromised information, details remain scarce, leaving many questions unanswered about the scope and impact of the cyber incident. The breach serves as a stark reminder of the ongoing battle against cyber threats and the imperative for organizations to prioritize data security to safeguard individuals’ privacy.

    Source: TechCrunch

  • Substack Data Breach Exposes User Information: Addressing Tech Security Challenges

    This article was generated by AI and cites original sources.

    Substack, a popular platform for content creators, recently disclosed a data breach that compromised users’ email addresses and phone numbers. The incident, acknowledged by Substack CEO Chris Best, occurred in October 2025 when a hacker gained unauthorized access to internal data. Notably, sensitive information like passwords and credit card details remained secure.

    In an email to affected users, Best stated that while email addresses, phone numbers, and internal metadata were accessed, there is currently no evidence of misuse. Nevertheless, users are advised to remain vigilant against suspicious emails or messages. Substack has taken corrective measures to address the security vulnerability and is actively investigating the breach to prevent similar incidents in the future.

    While specific details about the breach are not disclosed, Substack’s commitment to enhancing its security protocols underscores the platform’s dedication to safeguarding user data. Best expressed regret over the breach, emphasizing Substack’s focus on data protection.

    This incident serves as a reminder of the ongoing challenges in maintaining data security in the digital age. It highlights the importance of robust cybersecurity measures for tech companies to uphold user trust and privacy.

    Source: The Verge

  • Malware-Infected Add-Ons Pose Risks to OpenClaw AI Platform

    This article was generated by AI and cites original sources.

    Recent reports have highlighted security concerns surrounding the OpenClaw AI platform, previously known as Clawdbot and Moltbot. The platform, designed to assist users with various tasks, has faced issues with its ‘skill’ extensions, which are user-submitted add-ons meant to enhance its functionality.

    Security researchers have identified a significant number of malicious add-ons, some disguised as tools for cryptocurrency trading automation, that deploy information-stealing malware. This has raised concerns about the platform’s integrity and the potential risks to users’ sensitive data, including crypto assets and login credentials.

    1Password product VP Jason Meller described the skill hub as ‘an attack surface,’ emphasizing the security risks posed by these add-ons. The platform monitoring service OpenSourceMalware has also reported a significant number of malicious skills and add-ons uploaded to the ClawHub marketplace within a short timeframe.

    These findings underscore the urgent need for enhanced security measures to safeguard users from potential cyber threats within the AI platform’s ecosystem.

    Source: The Verge

  • Sophisticated Backdoor Discovered in Notepad++ Update Infrastructure

    This article was generated by AI and cites original sources.

    Suspected Chinese state-backed hackers compromised the update infrastructure of Notepad++, a popular text editor for Windows, for six months. The attackers redirected update traffic to deliver backdoored versions of the app to specific targets. The incident, which began last June, allowed the hackers to install a sophisticated and permanent backdoor named Chrysalis.

    The author of Notepad++ acknowledged the hijacking and indicated that control was regained in December. Security firm Rapid 7 described the backdoor as a ‘custom, feature-rich’ tool, highlighting its advanced capabilities. Despite efforts to fix vulnerabilities, the attackers maintained access until December, exploiting insufficient update verification controls in older Notepad++ versions.

    Incident responders discovered the compromise persisted until September, with the threat actors retaining credentials to internal services. The hackers targeted the Notepad++ domain specifically, attempting to re-exploit weaknesses even after fixes were implemented.

    This breach underscores the importance of robust security measures in software update mechanisms, as even widely-used applications like Notepad++ are susceptible to sophisticated attacks.

    Source: WIRED

  • Cybercriminals Breach Harvard and UPenn Data, Exposing Sensitive Information

    This article was generated by AI and cites original sources.

    A recent cyber attack has brought Harvard University and the University of Pennsylvania (UPenn) into the spotlight. The infamous hacking group ShinyHunters has claimed responsibility for breaching the data security of these prestigious institutions. The group allegedly published over a million records from each university on their dedicated leak site, a platform often used for extortion purposes.

    In the case of UPenn, the breach involved a select group of information systems linked to the university’s development and alumni activities. The hackers reportedly used social engineering tactics, a method that involves impersonation to deceive individuals into taking unwanted actions. Although the specific data accessed remains undisclosed, the breach had a significant impact on the university community.

    Similarly, Harvard University faced its own data breach on alumni systems due to a voice phishing attack, where targets are manipulated into interacting with malicious links or attachments through voice calls. This incident underscores the evolving tactics employed by cybercriminals to infiltrate secure networks.

    Verification of the compromised data by TechCrunch, through cross-referencing with public records and alumni, highlights the severity of these breaches and the importance of robust cybersecurity measures in educational institutions.

    Source: TechCrunch

  • French Authorities Expand Probe into X Technology over Alleged Criminal Activities

    This article was generated by AI and cites original sources.

    French police and Europol recently conducted a search at the local office of X, as confirmed by the Paris prosecutor’s office. This search is part of an ongoing investigation that began in 2025, focusing on allegations of data extraction fraud by an organized group.

    The investigation has now expanded to include additional suspected crimes such as complicity in the possession and distribution of child sexual exploitation material, privacy violations, and Holocaust denial. This expansion follows criticisms faced by X and its CEO, Elon Musk, regarding the misuse of its AI system, Grok AI, which has reportedly been used to generate nonconsensual and harmful imagery on the platform.

    Elon Musk, the CEO of X, and former X chief executive Linda Yaccarino have been summoned for questioning in relation to these allegations. The Paris prosecutor’s office also issued summons to unnamed X employees for the same period, highlighting the gravity of the situation.

    Requests for comments from X and eMed, where Yaccarino currently serves as the CEO, have not been responded to at this time. Maylis De Roeck, a spokesperson for the Paris prosecutor’s office, emphasized the objective of ensuring X’s compliance with French law, given its operations within the country.

    Source: TechCrunch

  • Homeland Security Seeks User Data from Tech Firms Regarding Critics of Trump Administration

    This article was generated by AI and cites original sources.

    The Department of Homeland Security has been utilizing administrative subpoenas to gather user information about critics of the Trump administration, as reported by TechCrunch. These subpoenas have been employed to collect identifiable data from tech companies, targeting individuals who manage anonymous Instagram accounts highlighting ICE immigration operations.

    Unlike judicial subpoenas that require judicial approval, administrative subpoenas issued by federal agencies allow investigators to request a broad range of information without oversight. While they cannot access email contents or search history, these subpoenas can reveal user login times, locations, devices, and associated email addresses.

    The use of administrative subpoenas to uncover details about individuals critical of the Trump administration’s policies has raised concerns. For instance, Homeland Security sought the identity of an anonymous Instagram account, @montocowatch, focused on supporting immigrant rights in Montgomery County, Pennsylvania.

    This situation underscores the delicate balance between privacy rights and government information requests within the tech sector, prompting discussions on data protection and government access to user data.

    Source: TechCrunch

  • India’s Supreme Court Scrutinizes WhatsApp’s Data Practices Amid Privacy Concerns

    This article was generated by AI and cites original sources.

    India’s Supreme Court has issued a stern warning to Meta, questioning WhatsApp’s data-sharing model and its privacy implications. The court scrutinized how WhatsApp monetizes user data, especially in a market where it dominates communication.

    With over 500 million users in India, WhatsApp faces scrutiny over potential misuse of metadata for advertising and AI purposes within Meta’s ecosystem. Chief Justice Surya Kant emphasized the importance of user privacy and consent, highlighting concerns about the lack of genuine choice for users.

    During the hearing, the court expressed skepticism about WhatsApp’s data practices, labeling the messaging service as a de facto monopoly. Justices raised questions about the commercial value of behavioral data and its exploitation for targeted advertising, underscoring the economic significance of even anonymized information.

    Meta’s defense focused on WhatsApp’s end-to-end encryption, ensuring message privacy. The company argued that the disputed privacy policy did not compromise user data protection or enable chat content for advertising purposes.

    Source: TechCrunch

  • Protecting Public Servants’ Privacy Amid Rising Threats

    This article was generated by AI and cites original sources.

    A recent report sheds light on the challenges faced by public servants in safeguarding their private data amid increasing violent threats. The study, conducted by researcher Justin Sherman of the Security Project at the Public Service Alliance, highlights the inadequacies of state-level consumer privacy laws in protecting civil servants, creating a concerning ‘data-to-violence pipeline.’

    Sherman’s analysis of 19 different consumer privacy laws reveals a significant gap in safeguarding public employees. While these laws grant consumers control over the sale of their personal information by data brokers, they fail to empower public servants to compel state agencies to redact their personal data from public records. Additionally, the absence of a ‘private right of action’ leaves public servants with limited recourse against privacy law violations.

    Amidst these challenges, threats against public servants have been on the rise, with over 1,600 individual threats documented between 2015 and 2025. Notably, a substantial portion of these incidents involve violent threats against local public servants, underscoring the urgency of addressing data privacy vulnerabilities.

    Source: WIRED

  • Notepad++ Confirms Chinese Hackers Breached Software Updates

    This article was generated by AI and cites original sources.

    The developer of the widely-used text editor Notepad++ has disclosed that hackers, suspected to have ties to the Chinese government, exploited its software update system to distribute malicious software to users for several months in 2025. According to Don Ho, the developer, security experts identified the cyberattack between June and December 2025, with the group responsible known as Lotus Blossom, a well-known espionage entity linked to China.

    Notepad++, a popular open-source project with millions of downloads globally, was infiltrated by hackers who targeted specific organizations, particularly in East Asia, by injecting tainted versions of the text editor. The compromised software allowed the attackers to gain unauthorized access to victims’ computers, highlighting the severity of the breach.

    The precise method of the intrusion into Notepad++’s servers is still being investigated. Ho revealed that the attackers exploited a vulnerability in the software to redirect users to a server controlled by the hackers, enabling the distribution of malicious updates to targeted users requesting software patches.

    Source: TechCrunch

  • Notepad++ Security Breach Exposes Risks of Shared Hosting

    This article was generated by AI and cites original sources.

    Notepad++, a popular text and code editor, recently faced a significant security breach that could have compromised user data and privacy. Last year, the app’s shared hosting servers were hijacked, leading to the distribution of a malicious update to unsuspecting users. The developer of Notepad++, Don Ho, disclosed that the attackers behind the breach were likely a Chinese state-sponsored group, and the servers remained vulnerable for approximately six months.

    The breach involved redirecting specific users to attacker-controlled servers, where their app updates were replaced with a malicious executable. This could have potentially granted the hackers remote access to users’ keyboards, posing a severe security threat. The attack was characterized by highly selective targeting, focusing on organizations with interests in East Asia.

    While the incident raises concerns about the security of shared hosting servers, Don Ho assured users that the attacker’s access was terminated by December 2nd, 2025. Notepad++ has since implemented enhanced security measures in its updater to prevent tampering and verify update authenticity. Users are advised to update to version 8.8.9 or later directly from the official Notepad++ website to mitigate the risks posed by the hijacking attack.

    Source: The Verge

  • Cybersecurity Concerns Raised by Allegations of Jeffrey Epstein’s ‘Personal Hacker’

    This article was generated by AI and cites original sources.

    Recent security news has revealed allegations that Jeffrey Epstein had a ‘personal hacker,’ as reported by WIRED. This revelation has sparked discussions about cybersecurity practices and the implications of having such a figure in one’s network.

    While the focus has been on the personal aspects of this situation, the core issue is the potential utilization of hacking capabilities for malicious purposes. The idea of a ‘personal hacker’ raises questions about the security measures individuals, especially those in sensitive positions, should take to protect their digital assets.

    Alongside this revelation, the article highlights concerning developments in the cybersecurity realm, such as the mention of the AI agent OpenClaw causing unease among cybersecurity experts. These events underscore the critical need for robust cybersecurity practices in an increasingly digitized world, as technology advances and threat actors adapt their methods and tools.

    Source: WIRED

  • Alleged Connection Between Jeffrey Epstein and a Skilled Hacker Raises Cybersecurity Concerns

    This article was generated by AI and cites original sources.

    According to a confidential informant, the FBI was informed in 2017 about Jeffrey Epstein’s alleged association with a skilled hacker. The hacker, reportedly of Italian origin, is said to have specialized in identifying vulnerabilities in iOS, BlackBerry devices, and the Firefox browser, and to have developed zero-day exploits and offensive cyber tools.

    The informant further disclosed that the hacker allegedly sold these tools to various countries, including an unnamed central African government, the U.K., and the United States. The hacker is also said to have provided a zero-day exploit to Hezbollah, receiving payment in cash.

    While these claims raise concerns about potential security breaches and cyber threats, it is essential to approach them with caution, as they are based solely on the informant’s statements and have not been directly confirmed by the FBI or the Justice Department. Both agencies have refrained from providing comments on these allegations, indicating the need for further investigation and verification of the information.

    Source: TechCrunch

  • Russian Hackers Exploit Vulnerabilities in Polish Power Grid

    This article was generated by AI and cites original sources.

    Recent reports reveal a concerning breach in Poland’s energy sector, where Russian government hackers infiltrated wind and solar farms as well as a heat-and-power plant, exploiting weak security measures. The intrusion, detailed in a report by Poland’s Computer Emergency Response Team (CERT), exposed the use of default credentials and the absence of multi-factor authentication, basic security oversights that facilitated the attack.

    The hackers attempted to deploy wiper malware to disrupt operations, but their efforts were thwarted at the heat-and-power plant, preventing any significant impact on the power supply. Although the wind and solar farms suffered system disruptions, the Polish power grid remained stable amidst the attack.

    This incident, reminiscent of past cyber assaults on energy infrastructure, underscores the critical importance of robust cybersecurity measures in safeguarding vital systems against malicious actors. The involvement of notorious Russian government hacking groups like Sandworm and Berserk Bear raises concerns about the persistent threat posed to critical infrastructure worldwide.

    Source: TechCrunch

  • Bluesky Transparency Report Highlights Surge in User Reports and Legal Demands

    This article was generated by AI and cites original sources.

    Bluesky, the social media startup, unveiled its inaugural transparency report, shedding light on its Trust & Safety team’s actions and various initiatives. The report highlights moderation, regulatory compliance, account takedowns, and more, with a significant fivefold increase in legal requests from government entities.

    In 2025, Bluesky experienced substantial growth, expanding its user base by almost 60% to 41.2 million users. The platform witnessed a surge in user activity, with 1.41 billion posts and 235 million media-containing posts, showcasing the platform’s increasing engagement.

    Notably, Bluesky saw a 54% rise in moderation reports from users in 2025, reflecting the company’s efforts to address user concerns amidst its rapid expansion. The uptick in moderation reports aligns closely with the platform’s user growth trajectory.

    Bluesky’s comprehensive transparency report marks a significant step towards openness, encompassing various facets beyond content moderation. The report details the company’s account verification processes and regulatory compliance efforts, demonstrating its commitment to transparency and user safety.

    As Bluesky navigates the evolving social media landscape, its transparency report serves as a benchmark for accountability and integrity in user interactions, setting a precedent for ethical practices in the industry.

    Source: TechCrunch

  • Crackdown on Manga Piracy: Bato.to Network Shut Down

    This article was generated by AI and cites original sources.

    Japan’s anti-piracy coalition has announced the shutdown of Bato.to, one of the largest manga piracy networks globally. This action followed a collaborative effort between Japanese publishers and Chinese authorities, resulting in the arrest of an individual suspected of copyright infringement related to Bato.to and around 60 associated sites.

    Bato.to, established in 2014, gained significant popularity as a platform for ‘scanalation,’ where manga and other comics are scanned, edited, translated, and shared within online communities. According to the Content Overseas Distribution Association (CODA), the 60 closed sites collectively attracted 350 million visits in May 2025, with Bato.to generating substantial advertising revenue, reaching over 400,000 yuan per peak month.

    While the operator of Bato.to has been released on bail, formal charges are anticipated. This development underscores the ongoing battle against online piracy and the significance of copyright protection in the digital age.

    Source: The Verge

  • Apple Enhances iPhone and iPad Privacy with New Location Data Restriction Feature

    This article was generated by AI and cites original sources.

    Apple has introduced a new security feature for select models of the latest iPhones and iPads, aimed at restricting the collection of precise location data by cell phone carriers. This move is designed to enhance user privacy and safeguard against potential threats from law enforcement, spies, and hackers seeking to access sensitive location information.

    When activated, this feature alters the level of precision in location data shared with the cell carrier, providing only general neighborhood information instead of specific street addresses. Apple assures that this adjustment does not impact the accuracy of location data exchanged with apps or emergency services during critical situations.

    The rollout of this privacy-enhancing feature includes support for devices like iPhone Air, iPhone 16e, and iPad Pro (M5) Wi-Fi + Cellular, running iOS 26.3, and is currently available on selected carriers worldwide, such as Telekom in Germany, AIS and True Thailand, EE and BT in the UK, and Boost Mobile in the US.

    As concerns grow over unauthorized access to location data, this development underscores the ongoing vulnerabilities in global cellular networks that have facilitated surveillance and the need for enhanced privacy measures in the digital age.

    Source: TechCrunch

  • AI Toy’s Security Flaw Exposes Children’s Private Conversations

    This article was generated by AI and cites original sources.

    A concerning security lapse has exposed over 50,000 chat logs between children and an AI-powered stuffed animal toy. Researchers discovered that Bondu, the toy company, had left its web console unprotected, allowing anyone with a Gmail account to access detailed transcripts of kids’ conversations with the toys.

    The web portal, designed for parental monitoring and product performance tracking, granted unauthorized access to sensitive data, including children’s names, birth dates, family members’ names, and the private chats they had with their Bondu companions.

    Researchers Joseph Thacker and Joel Margolis demonstrated how easily these private conversations could be accessed without resorting to hacking techniques, highlighting the significant privacy implications of such a vulnerability.

    This incident underscores the critical importance of robust security measures in IoT devices, especially those targeting children. Companies like Bondu must prioritize data protection to prevent unauthorized access to sensitive information, ensuring the safety and privacy of young users.

    Source: WIRED