© 2025 CoolTechZone - Latest tech news,
product reviews, and analyses.

Threats

Human Rights Watch: ‘Photos of children being used to train AI tools’

According to Human Rights Watch personal photos of Australian children are being used to create powerful artificial intelligence (AI) tools. Even worse: parents aren’t aware of it and haven’t consented.
Read more about Human Rights Watch: ‘Photos of children being used to train AI tools’

LockBit claims responsibility for cyber attack on Croatian hospital

Ransomware gang LockBit claims it’s the mastermind behind the cyber attack on the University Hospital Centre in Zagreb, also known as KBC Zagreb.
Read more about LockBit claims responsibility for cyber attack on Croatian hospital

Photos of 500K members of UK health club Total Fitness leaked due to unprotected database

Cybersecurity researcher Jeremiah Fowler discovered a non-password protected database belonging to Total Fitness, containing 474,651 pictures of members.
Read more about Photos of 500K members of UK health club Total Fitness leaked due to unprotected database

Researchers discover fake Chrome errors, tricking users into running malicious PowerShell scripts

Security researchers working for cybersecurity firm Proofpoint, have identified a new social engineering technique to trick Google Chrome users to run PowerShell scripts and install malware.
Read more about Researchers discover fake Chrome errors, tricking users into running malicious PowerShell scripts

ASUS releases patches for several router models

Taiwanese manufacturer ASUS has released an update for seven different router models, containing a critical vulnerability that lets attackers bypass authentication.
Read more about ASUS releases patches for several router models

NHS calls for blood donation after cyberattack on British hospitals

The National Health Service (NHS) is struggling to match patients’ blood after numerous London hospitals have been hit by a ransomware attack. To speed up the process, the healthcare system is appealing to people to donate O-type blood, the universal donor.
Read more about NHS calls for blood donation after cyberattack on British hospitals

Zero-day exploit used to hack high-profile TikTok accounts

Last week, attackers compromised numerous official TikTok accounts of high-profile brands and celebrities, such as CNN, Sony and Paris Hilton.
Read more about Zero-day exploit used to hack high-profile TikTok accounts

Check Point sends out security reminder to fix unauthorized access to VPNs

Cybersecurity firm Check Point urges customers to install a bug fix for a vulnerability in its own VPN solution that’s been actively exploited by hackers.
Read more about Check Point sends out security reminder to fix unauthorized access to VPNs

Israeli intelligence agencies allegedly spying on ICC

For almost a decade, Israel has led a secret ‘war’ against the International Criminal Court (ICC). Intelligence agencies reportedly surveilled, hacked, pressured, smeared and threatened senior ICC staff in an effort to derail the court’s inquiries.
Read more about Israeli intelligence agencies allegedly spying on ICC

Check Point: ‘More hackers using VPN environments as entry point for cyberattacks’

Over the past few months, cybersecurity company Check Point has observed an increased interest of malicious groups misusing its remote access VPN devices as an entry point and attack vector into enterprises.
Read more about Check Point: ‘More hackers using VPN environments as entry point for cyberattacks’

Most US websites unprotected against bot attacks

While bot attacks are surging, the latest industry report shows that most US websites are vulnerable to simple bot attacks.
Read more about Most US websites unprotected against bot attacks

Scammers lurk on LinkedIn

Scammers are looking for their victims and other job sites, posing as recruiters for well-known companies, the Federal Trade Commission (FTC) warned.
Read more about Scammers lurk on LinkedIn

UK banks lagging behind on email security, study finds

More than half of banking institutions in the UK are slacking on cybersecurity, leaving staff and customers wide open to phishing attacks, analyst Proofpoint has warned.
Read more about UK banks lagging behind on email security, study finds

Security analyst issues payroll fraud warning

Hijacked employee email addresses can be used by criminals to impersonate workers and trick companies into paying them their salaries instead, a security analyst warns.
Read more about Security analyst issues payroll fraud warning

Engineering workstations deemed riskiest in critical infrastructure facilities

While hackers target most operational technology (OT) and industrial control system (ICS) devices, some receive more attention than others.
Read more about Engineering workstations deemed riskiest in critical infrastructure facilities

Bad to the cyber-bone: analyst warns of malicious bots flooding internet

Malicious programs that mimic human computer use for cybercriminal purposes, known as “bad bots,” are becoming more sophisticated, a study says.
Read more about Bad to the cyber-bone: analyst warns of malicious bots flooding internet

New threat actor on the cyber-scene in Ukraine, says analyst

A previously unidentified partisan group is believed to be using new malware programs to phish for details of targets in disputed Russian-held areas of Ukraine.
Read more about New threat actor on the cyber-scene in Ukraine, says analyst

Phishing scam caught using hijacked student accounts

Malicious hackers are taking over student email accounts and using these as a cover for social engineering scams aimed at tricking staff at other businesses into handing over sensitive data, a report has found.
Read more about Phishing scam caught using hijacked student accounts

Cookies from youtube.com – better not

Image source – pandasecurity.com Have you ever visited an online shopping website after a long time and saw your cart...
Read more about Cookies from youtube.com – better not

Why using Torrents can trap your computer into a botnet

1
As of 2020, there are 7.7 million IoT devices on the Internet. Most of these devices are not protected by...
Read more about Why using Torrents can trap your computer into a botnet