GoBruteforcer malware uses weak passwords and exposed services to build a botnet targeting crypto projects, Linux servers, and databases.
Hackers over the past six months have relied increasingly more on the browser-in-the-browser (BitB) method to trick users into providing Facebook account credentials.
The BitB phishing technique was developed by security researcher mr.d0x in 2022. Cybercriminals later adopted it in attacks targeting various online services, including Facebook and Steam.
Trellix researchers monitoring malicious activity say that threat actors steal Facebook accounts to spread scams, harvest personal data, or commit identity fraud. With more than three billion active users, the social network is still a prime target for fraudsters.
Apex Legends players over the weekend experienced disruptions during live matches as threat actors hijacked their characters, disconnected them, and changed their nicknames.
Respawn, the publisher of the still popular battle royale-hero shooter, issued a public statement about the security incident, assuring players that it hadn’t been caused by an exploit or malware infection.
The title continues to have a large user base, with an estimated half a million daily concurrent players across all platforms as of mid-2025.
2026 — Trends and Insights on Cybersecurity, Artificial Intelligence, and Quantum Computing
By Chuck Brooks
Dear readers, Happy New Year! Please see the latest Security & Tech Insights newsletter that explores evolving tech and security trends for 2026. It is going to be an exciting year for AI, Quantum, Cybersecurity, Space and Robotics! Thanks, and best Chuck Brooks
What Every Company Needs To Know About Cybersecurity In 2026
The TOI Tech Desk is a dedicated team of journalists committed to delivering the latest and most relevant news from the world of technology to readers of The Times of India. TOI Tech Desk’s news coverage spans a wide spectrum across gadget launches, gadget reviews, trends, in-depth analysis, exclusive reports and breaking stories that impact technology and the digital universe. Be it how-tos or the latest happenings in AI, cybersecurity, personal gadgets, platforms like WhatsApp, Instagram, Facebook and more; TOI Tech Desk brings the news with accuracy and authenticity.
Podcast with Chuck Brooks, Adjunct Professor at Georgetown University and President of Brooks Consulting International — Quantum Computing Report.
Overview In this episode of The Quantum Spin by HKA, host Veronica Combs discusses the intersections of quantum technology and cybersecurity with Chuck Brooks, an adjunct professor at Georgetown University and the president of Brooks Consulting International. Chuck discusses how the evolution of technology, particularly AI and quantum computing, has dramatically transformed cybersecurity. The conversation also touches on the role of CISOs, the integration of new technologies, and the importance of ongoing education and adaptation in the face of rapidly changing technologies. 00:00 Introduction to Quantum Spin Podcast00:34 Guest Introduction: Chuck Brooks00:46 Chuck Brooks’ Career […].
A sophisticated threat actor that uses Linux-based malware to target telecommunications providers has recently broadened its operations to include organizations in Southeastern Europe.
Tracked internally by Cisco Talos as UAT-7290, the actor shows strong China nexus indicators and typically focuses on telcos in South Asia in cyber-espionage operations.
Active since at least 2022, the UAT-7290 group also serves as an initial access group by establishing an Operational Relay Box (ORB) infrastructure during the attacks, which is then utilized by other China-aligned threat actors.