Hackers
7 articles · Jan 2026 — Feb 2026
Summary being generated — check back shortly.
Coverage Timeline 7 articles
Hackers Bypass Email Gateways with Simple Phone Number Trick
Cyber attackers are using a new tactic to bypass email gateways, sending emails with only a phone number as the payload, tricking victims into divulging sensitive information.
Hackers Breach Networks Faster Than Ever
Hackers are compromising networks at an alarming rate, with the average breach time dropping to just 29 minutes in 2025, driven by the increasing use of AI-powered attacks.
Can Google Sheets be used for espionage?
China-linked hackers exploited app to spy on telecoms and governments
Hackers Seize Control of Enterprise MDM Servers via Ivanti Zero-Days
Critical vulnerabilities in Ivanti Endpoint Manager Mobile exploited in the wild
Cybercrime Surge: AI-Powered Attacks on the Rise
A surge in AI-powered cyberattacks is crippling institutions worldwide, with hackers using sophisticated tools to infiltrate and extort money from hospitals, banks, and art museums.
Are Hackers Winning the Cyber War?
Sophisticated attacks on supply chains, energy infrastructure, and corporate brands
Cybersecurity Threats Escalate as Hackers Target Corporate Data and Infrastructure
A surge in cybersecurity threats is putting corporate data and infrastructure at risk, with hackers targeting cloud file-sharing sites, broadband providers, and other vulnerable systems. The threats range from data theft and ransomware attacks to the exploitation of new technologies like agentic AI. As the landscape of cybersecurity continues to evolve, companies must stay vigilant to protect themselves against these escalating threats.