Shopping News / Articles
China's Tianjin Supercomputer Center Allegedly Hit in 10-Petabyte Data Theft
3+ hour, 30+ min ago (383+ words) A threat actor has allegedly executed one of the largest data heists in China's history, siphoning an astounding 10 petabytes of highly classified information from the National Supercomputing Center (NSCC) in Tianjin. The Tianjin center serves as a centralized infrastructure hub…...
RUH-ROH RHINA! Hacker Allegedly Steals Vast Amounts of Classified Data From Chinese Supercomputer
55+ min ago (598+ words) Last night on X, some potentially huge news broke on X about a massive data breach in China that, if genuine, could soon see vast amounts of Chinese sensitive data in the hands of other governments." And we're not talking…...
Linux Foundation Leader Impersonated in Slack Attack on Open Source Developers
4+ hour, 46+ min ago (530+ words) A social engineering campaign is actively targeting open source developers through Slack. The warning was shared through the Open SSF Siren mailing list, a public threat intelligence platform designed to alert developers and security teams about active threats after initial…...
Eurail Data Breach Exposes Over 300, 000 Passenger Passports
2+ hour, 16+ min ago (266+ words) The December Eurail B. V. breach occurred on December 26, when unauthorized threat actors infiltrated the IT infrastructure of the Netherlands-based organization managing cross-border rail passes for 35 European railway operators." Following the network intrusion, the company filed official data breach notifications with U. S. state…...
Russian hackers using home and office Wifi routers as spying devices
22+ hour, 31+ min ago (488+ words) By KRISTINA WEMYSS, GENERAL NEWS REPORTER Hackers linked to the Russian state are turning wifi routers in British homes and offices into spying devices, GCHQ has warned. The espionage group, called Fancy Bear, has been exploiting vulnerabilities in the technology…...
This fake Windows support website delivers password-stealing malware
2+ hour, 44+ min ago (1362+ words) A fake Microsoft support website is tricking people into downloading what looks like a normal Windows update. Instead, it installs malware designed to steal passwords, payment details, and account access. Because the file looks legitimate and avoids detection, it can…...
New Silver Fox Attack Uses Fake Telegram Installer To Deliver Valley RAT
5+ hour, 40+ min ago (398+ words) On April 8, 2026, security researchers identified a new malware campaign from the Chinese-linked Silver Fox hacking group. The attackers are using a fake Chinese-language Telegram pack to silently infect Windows computers with a powerful backdoor known as Valley RAT. This attack…...
10 petabytes of sensitive data stolen from China's National Supercomputing Center, hackers claim " daring heist would be largest ever China hack, covering 6, 000 clients across science, defense, and beyond
2+ hour, 42+ min ago (462+ words) Tom's Hardware - Get deeper insights with deeper News Analysis posts You are now subscribed Your newsletter sign-up was successful A hacker (or hacker group) claims to have extracted more than 10 petabytes (1 PB = 1000 TB) of highly sensitive information from China's National…...
China supercomputing centre breach exposes vast trove of defence research data
3+ hour, 19+ min ago (351+ words) Using a compromised VPN domain as the entry point, the intruder moved carefully, avoiding any dramatic actions that might raise alarms in the multi-user environment, where network segmentation was weaker than expected. "Instead of rushing, the hacker deployed a botnet…...
Google warns: UNC6783 is targeting BPO firms for wider breaches
3+ hour, 37+ min ago (422+ words) A threat actor tracked as UNC6783 is compromising business process outsourcing (BPO) providers to gain access to high-value companies across multiple sectors. Evidence suggests that dozens of corporate entities have been targeted using this method to exfiltrate sensitive data for extortion....
Shopping
Please enter a search for detailed shopping results.