Operation Endgame takes a serious cut out of the hacking tools market.

Operation Endgame takes a serious cut out of the hacking tools market.

Operation Endgame is a major, ongoing international law enforcement initiative targeting the infrastructure and services that enable ransomware and other forms of cybercrime. Launched in May 2024, the operation is coordinated by agencies including the FBI, Europol, Eurojust, and law enforcement from multiple countries such as the United States, Denmark, France, Germany, the Netherlands, and the United Kingdom.
What is Localhost Tracking and how come Meta got their hands slapped for their dirty deed.

What is Localhost Tracking and how come Meta got their hands slapped for their dirty deed.

Localhost tracking is a recently exposed technique that allowed companies—most notably Meta (the parent company of Facebook and Instagram)—to covertly link users’ mobile web browsing activity to their real identities, even if users never logged into their accounts through their browsers or used privacy features like incognito mode or cookie clearing.
CISA Advisory – Ransomware actors exploiting unpatched SimpleHelp Remote Monitoring and Management software.

CISA Advisory – Ransomware actors exploiting unpatched SimpleHelp Remote Monitoring and Management software.

CISA Cybersecurity Advisory AA25-163A, released on June 12, 2025, addresses a significant ransomware threat exploiting unpatched vulnerabilities in SimpleHelp Remote Monitoring and Management (RMM) software. The advisory was prompted by incidents in which ransomware actors compromised customers of a utility billing software provider by leveraging these vulnerabilities.
New method (SmartAttack) uses ultrasonic transmissions to send stolen data from air-gapped systems to smartwatches.

New method (SmartAttack) uses ultrasonic transmissions to send stolen data from air-gapped systems to smartwatches.

A newly discovered cyberattack method, dubbed SmartAttack, leverages smartwatches and ultrasonic signals to steal data from air-gapped systems—computers physically isolated from external networks. Developed by researchers led by Mordechai Guri at Ben-Gurion University, this technique exploits smartwatch microphones to capture covert ultrasonic transmissions from compromised air-gapped machines.
Paragon’s Graphite spyware used in sophisticated zero-click attack against new iPhones.

Paragon’s Graphite spyware used in sophisticated zero-click attack against new iPhones.

In June 2025, security researchers at Citizen Lab confirmed the first forensic evidence that Paragon’s ‘Graphite’ spyware was used in highly sophisticated zero-click attacks targeting up-to-date iPhones, specifically those running iOS 18.2.1. These attacks required no user interaction and left almost no visible traces, making detection and attribution particularly challenging.
New TokenBreak attack bypasses LLM protective guardrails.

New TokenBreak attack bypasses LLM protective guardrails.

A newly discovered cyber attack technique, called TokenBreak, targets the tokenization process of text classification models, particularly those used as protective guardrails for large language models (LLMs). The attack exploits how certain tokenizers break down and interpret text, allowing adversaries to bypass content moderation, safety, toxicity, and spam detection systems with minimal changes to input text.
Cloudflare notes increase in cyberattacks against journalists.

Cloudflare notes increase in cyberattacks against journalists.

Cloudflare reports a dramatic surge in cyberattacks targeting journalists and independent media organizations over the past year. Between May 2024 and April 2025, Cloudflare blocked nearly 109 billion malicious requests aimed at organizations protected under its Project Galileo, with attacks against journalists and news organizations accounting for 97 billion of those requests—an average of 290 million per day. This marks a 241% increase in attack volume compared to the previous year.