<rss version="2.0"
    xmlns:dc="http://purl.org/dc/elements/1.1/"
    xmlns:content="http://purl.org/rss/1.0/modules/content/"
    xmlns:atom="http://www.w3.org/2005/Atom"
    xmlns:media="http://search.yahoo.com/mrss/">
    <channel><title>Consumer Insights</title><description>News, views and insights from the Bitdefender experts</description><link>https://www.bitdefender.com/en-us/blog/hotforsecurity/</link><image><url>https://download.bitdefender.com/resources/images/favicon/favicon-32x32.png</url><title>Consumer Insights</title><link>https://www.bitdefender.com/en-us/blog/hotforsecurity/</link></image><generator>Bitdefender Blog</generator><lastBuildDate>Sat, 18 Apr 2026 11:47:06 GMT</lastBuildDate><atom:link href="https://www.bitdefender.com/nuxt/api/en-us/rss/hotforsecurity/industry-news/" rel="self" type="application/rss+xml"/><ttl>1800</ttl><item><title>Operation PowerOFF warns 75,000 DDoS users as 53 domains go dark</title><description><![CDATA[Europol-backed Operation PowerOFF warned 75,000 users, seized 53 domains, and widened the crackdown on DDoS-for-hire services.]]></description><link>https://www.bitdefender.com/en-us/blog/hotforsecurity/operation-poweroff-75-000-ddos-users</link><guid isPermaLink="false">69e1f9da2fa53a9f2eef61bd</guid><category><![CDATA[Industry News]]></category><dc:creator>Vlad CONSTANTINESCU</dc:creator><pubDate>Fri, 17 Apr 2026 09:16:25 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/hotforsecurity/content/images/2026/04/compagnons-EJe6LqEjHpA-unsplash-1.jpg" medium="image"/><content:encoded><![CDATA[Europol-backed Operation PowerOFF warned 75,000 users, seized 53 domains, and widened the crackdown on DDoS-for-hire services.]]></content:encoded></item><item><title>Singer loses life savings to fake wallet downloaded from the Apple App Store</title><description><![CDATA[If you hold cryptocurrency, there's a very simple golden rule that you should always follow. Never hand over your seed phrase.

Garrett Dutton, better known as G. Love - the front man of blues-hip-hop outfit G. Love & Special Sauce - has learnt that lesson the hard way.

In what must have been a painful admission earlier this month, G. Love described how while setting up a new computer, he downloaded what he believed was the legitimate Ledger Live app from Apple's official App Store.

The bogus ]]></description><link>https://www.bitdefender.com/en-us/blog/hotforsecurity/singer-loses-life-savings-fake-wallet</link><guid isPermaLink="false">69e1dd0b2fa53a9f2eef609c</guid><category><![CDATA[Industry News]]></category><category><![CDATA[Scam]]></category><dc:creator>Graham CLULEY</dc:creator><pubDate>Fri, 17 Apr 2026 07:12:02 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/hotforsecurity/content/images/2026/04/fake-app.jpeg" medium="image"/><content:encoded><![CDATA[If you hold cryptocurrency, there's a very simple golden rule that you should always follow. Never hand over your seed phrase.

Garrett Dutton, better known as G. Love - the front man of blues-hip-hop outfit G. Love & Special Sauce - has learnt that lesson the hard way.

In what must have been a painful admission earlier this month, G. Love described how while setting up a new computer, he downloaded what he believed was the legitimate Ledger Live app from Apple's official App Store.

The bogus ]]></content:encoded></item><item><title>AgingFly malware hits local authorities and hospitals in Ukraine</title><description><![CDATA[CERT-UA links a new credential-stealing campaign to phishing, browser theft and modular remote access.


Phishing lure initial vector

Ukraine’s national cyber response team (CERT-UA) has uncovered a new malware family, dubbed AgingFly, in attacks on local government bodies and hospitals. Forensic evidence suggests some Defense Forces representatives may also have been targeted. CERT-UA tracks the activity under the UAC-0247 cluster.

According to the incident report, the campaign begins with em]]></description><link>https://www.bitdefender.com/en-us/blog/hotforsecurity/agingfly-malware-ukraine</link><guid isPermaLink="false">69e0e52b2fa53a9f2eef6085</guid><category><![CDATA[Industry News]]></category><category><![CDATA[Ukraine]]></category><dc:creator>Vlad CONSTANTINESCU</dc:creator><pubDate>Thu, 16 Apr 2026 13:36:48 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/hotforsecurity/content/images/2026/04/ed-hardie-1C5F88Af9ZU-unsplash.jpg" medium="image"/><content:encoded><![CDATA[CERT-UA links a new credential-stealing campaign to phishing, browser theft and modular remote access.


Phishing lure initial vector

Ukraine’s national cyber response team (CERT-UA) has uncovered a new malware family, dubbed AgingFly, in attacks on local government bodies and hospitals. Forensic evidence suggests some Defense Forces representatives may also have been targeted. CERT-UA tracks the activity under the UAC-0247 cluster.

According to the incident report, the campaign begins with em]]></content:encoded></item><item><title>108 malicious Chrome extensions caught stealing Google and Telegram data from 20,000 users</title><description><![CDATA[Cybersecurity researchers have revealed that 108 malicious Google Chrome extensions have been quietly stealing user credentials, hijacking Telegram sessions, and injecting unwanted ads and scripts into browsers - all reporting back to the same central point.

The discovery by researchers at Socket, found that all 108 extensions were communicating with a single command-and-control server, strongly suggesting they are the work of one group of hackers.

Between them, before being identified, the ex]]></description><link>https://www.bitdefender.com/en-us/blog/hotforsecurity/malicious-chrome-extensions-steal-google-telegram-data</link><guid isPermaLink="false">69df6d5c2fa53a9f2eef604f</guid><category><![CDATA[Industry News]]></category><dc:creator>Graham CLULEY</dc:creator><pubDate>Wed, 15 Apr 2026 10:54:29 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/hotforsecurity/content/images/2026/04/extensions.jpeg" medium="image"/><content:encoded><![CDATA[Cybersecurity researchers have revealed that 108 malicious Google Chrome extensions have been quietly stealing user credentials, hijacking Telegram sessions, and injecting unwanted ads and scripts into browsers - all reporting back to the same central point.

The discovery by researchers at Socket, found that all 108 extensions were communicating with a single command-and-control server, strongly suggesting they are the work of one group of hackers.

Between them, before being identified, the ex]]></content:encoded></item><item><title>Rockstar Games confirms breach after ShinyHunters leaks stolen analytics data</title><description><![CDATA[Rockstar Games says a third-party breach exposed internal analytics data after ShinyHunters linked the incident to Anodot and Snowflake.]]></description><link>https://www.bitdefender.com/en-us/blog/hotforsecurity/rockstar-games-data-breach</link><guid isPermaLink="false">69de05b62fa53a9f2eef5f71</guid><category><![CDATA[Industry News]]></category><category><![CDATA[Data Breach]]></category><dc:creator>Vlad CONSTANTINESCU</dc:creator><pubDate>Tue, 14 Apr 2026 09:23:44 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/hotforsecurity/content/images/2026/04/Rockstar-Games-confirms-data-breach.jpg" medium="image"/><content:encoded><![CDATA[Rockstar Games says a third-party breach exposed internal analytics data after ShinyHunters linked the incident to Anodot and Snowflake.]]></content:encoded></item><item><title>FBI: Cybercrime Losses Hit a Record $21 Billion Last Year, Fueled by AI</title><description><![CDATA[Americans reported losing $20.9 billion to cybercrime in 2025—much of it to AI-enabled scams.

The FBI’s latest Internet Crime Complaint Center (IC3) report reveals that cybercrime losses in the U.S. surged to nearly $21 billion in 2025, setting a new record and marking a dramatic jump from the already staggering $16.6 billion reported for 2024.

Scams are becoming more sophisticated, more scalable, and far more profitable than ever.


Key takeaways


 * Cybercrime losses reached ~$21 billion in]]></description><link>https://www.bitdefender.com/en-us/blog/hotforsecurity/fbi-cybercrime-losses-21-billion-2025-ai</link><guid isPermaLink="false">69d66ba32fa53a9f2eef5e88</guid><category><![CDATA[Industry News]]></category><dc:creator>Filip TRUȚĂ</dc:creator><pubDate>Wed, 08 Apr 2026 14:59:32 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/hotforsecurity/content/images/2026/04/header-cybercrime-losses-2025-FBI-1.png" medium="image"/><content:encoded><![CDATA[Americans reported losing $20.9 billion to cybercrime in 2025—much of it to AI-enabled scams.

The FBI’s latest Internet Crime Complaint Center (IC3) report reveals that cybercrime losses in the U.S. surged to nearly $21 billion in 2025, setting a new record and marking a dramatic jump from the already staggering $16.6 billion reported for 2024.

Scams are becoming more sophisticated, more scalable, and far more profitable than ever.


Key takeaways


 * Cybercrime losses reached ~$21 billion in]]></content:encoded></item><item><title>Life imprisonment for Cambodian scam compound operators - but will it make a difference?</title><description><![CDATA[Cambodia has taken a dramatic step in its fight against scam compounds that have imprisoned innocent people, and forced them to work as virtual slaves defrauding victims via the internet around the world with romance scams and dodgy investment schemes.

But with Amnesty International simultaneously revealing that state-licensed casinos are directly linked to torture and trafficking, serious questions linger about whether enforcement will match the rhetoric.

Cambodia's Law on Combating Online Sc]]></description><link>https://www.bitdefender.com/en-us/blog/hotforsecurity/life-imprisonment-cambodian-scam-operators</link><guid isPermaLink="false">69d4aa682fa53a9f2eef5d2c</guid><category><![CDATA[Industry News]]></category><category><![CDATA[Scam]]></category><dc:creator>Graham CLULEY</dc:creator><pubDate>Tue, 07 Apr 2026 06:56:43 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/hotforsecurity/content/images/2026/04/compound.jpeg" medium="image"/><content:encoded><![CDATA[Cambodia has taken a dramatic step in its fight against scam compounds that have imprisoned innocent people, and forced them to work as virtual slaves defrauding victims via the internet around the world with romance scams and dodgy investment schemes.

But with Amnesty International simultaneously revealing that state-licensed casinos are directly linked to torture and trafficking, serious questions linger about whether enforcement will match the rhetoric.

Cambodia's Law on Combating Online Sc]]></content:encoded></item><item><title>Fake Claude code leak on GitHub pushes Vidar malware</title><description><![CDATA[Fake Claude Code leak repos on GitHub are pushing Vidar malware at people hunting for Anthropic’s exposed source code.]]></description><link>https://www.bitdefender.com/en-us/blog/hotforsecurity/claude-code-leak-github-vidar-malware</link><guid isPermaLink="false">69cfb0462fa53a9f2eef5c79</guid><category><![CDATA[Industry News]]></category><dc:creator>Vlad CONSTANTINESCU</dc:creator><pubDate>Fri, 03 Apr 2026 12:21:40 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/hotforsecurity/content/images/2026/04/xavier-cee-genkxag3nY4-unsplash.jpg" medium="image"/><content:encoded><![CDATA[Fake Claude Code leak repos on GitHub are pushing Vidar malware at people hunting for Anthropic’s exposed source code.]]></content:encoded></item><item><title>Apple Expands ‘DarkSword’ Patch to More iPhones and iPads — Update Today!</title><description><![CDATA[Apple has expanded the availability of iOS 18.7.7 to a wide range of iPhone and iPad models, delivering important security fixes for people resisting the jump to iOS 26.


Key takeaways:


 * The patch targeting the DarkSword exploit is now available to a much broader range of iPhones and iPads — not just older models
 * Tools once reserved for targeted surveillance are now trickling down into wider cybercriminal use
 * Apple is actively backporting security fixes to iOS 18, acknowledging that m]]></description><link>https://www.bitdefender.com/en-us/blog/hotforsecurity/apple-expands-darksword-patch-more-iphones-and-ipads</link><guid isPermaLink="false">69cfa5e82fa53a9f2eef5c43</guid><category><![CDATA[Industry News]]></category><category><![CDATA[Mobile Security]]></category><dc:creator>Filip TRUȚĂ</dc:creator><pubDate>Fri, 03 Apr 2026 11:52:20 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/hotforsecurity/content/images/2026/04/apple-products-header.jpg" medium="image"/><content:encoded><![CDATA[Apple has expanded the availability of iOS 18.7.7 to a wide range of iPhone and iPad models, delivering important security fixes for people resisting the jump to iOS 26.


Key takeaways:


 * The patch targeting the DarkSword exploit is now available to a much broader range of iPhones and iPads — not just older models
 * Tools once reserved for targeted surveillance are now trickling down into wider cybercriminal use
 * Apple is actively backporting security fixes to iOS 18, acknowledging that m]]></content:encoded></item><item><title>Nigerian romance scammer jailed after being caught out by fellow fraudster</title><description><![CDATA[A Nigerian man who posed as a woman online to swindle men out of their savings has been sentenced to 15 years in a US prison. And in a surprising twist, it turns out that he was caught out after accidentally trying to swindle a fellow fraudster.

35-year-old Saheed Sunday Owolabi was sentenced after a jury trial in Wilmington, North Carolina, which saw him convicted of conspiracy to commit wire fraud and money laundering.

According to evidence presented at the trial, Owolabi would pretend to be]]></description><link>https://www.bitdefender.com/en-us/blog/hotforsecurity/nigerian-romance-scammer-jailed</link><guid isPermaLink="false">69cf76ad2fa53a9f2eef5b88</guid><category><![CDATA[Industry News]]></category><category><![CDATA[Scam]]></category><dc:creator>Graham CLULEY</dc:creator><pubDate>Fri, 03 Apr 2026 08:14:20 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/hotforsecurity/content/images/2026/04/romance-jail.jpeg" medium="image"/><content:encoded><![CDATA[A Nigerian man who posed as a woman online to swindle men out of their savings has been sentenced to 15 years in a US prison. And in a surprising twist, it turns out that he was caught out after accidentally trying to swindle a fellow fraudster.

35-year-old Saheed Sunday Owolabi was sentenced after a jury trial in Wilmington, North Carolina, which saw him convicted of conspiracy to commit wire fraud and money laundering.

According to evidence presented at the trial, Owolabi would pretend to be]]></content:encoded></item><item><title>Fake WhatsApp Clone Used in Spyware Campaign, Meta Warns</title><description><![CDATA[A counterfeit WhatsApp application was used in a targeted spyware campaign affecting around 200 users — primarily in Italy, Meta has warned.


Key takeaways:


 * Attackers distributed a counterfeit version of WhatsApp that functioned as surveillance software once installed.
 * Instead of hacking the app, attackers relied on deception, tricking victims into installing the malicious version themselves.
 * The campaign appears targeted, with links to an Italian surveillance vendor.
 * Victims were]]></description><link>https://www.bitdefender.com/en-us/blog/hotforsecurity/fake-whatsapp-clone-spyware-meta</link><guid isPermaLink="false">69ce61952fa53a9f2eef5b36</guid><category><![CDATA[Industry News]]></category><category><![CDATA[Mobile Security]]></category><dc:creator>Filip TRUȚĂ</dc:creator><pubDate>Thu, 02 Apr 2026 12:42:10 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/hotforsecurity/content/images/2026/04/header.jpg" medium="image"/><content:encoded><![CDATA[A counterfeit WhatsApp application was used in a targeted spyware campaign affecting around 200 users — primarily in Italy, Meta has warned.


Key takeaways:


 * Attackers distributed a counterfeit version of WhatsApp that functioned as surveillance software once installed.
 * Instead of hacking the app, attackers relied on deception, tricking victims into installing the malicious version themselves.
 * The campaign appears targeted, with links to an Italian surveillance vendor.
 * Victims were]]></content:encoded></item><item><title>Fake CERT-UA emails push AGEWHEEZE in mass Ukraine phishing wave</title><description><![CDATA[A CERT-UA spoofing campaign used fake security tools to spread remote access malware to numerous email addresses.


CERT-UA used as a phishing lure

Ukraine’s cyber defenders are warning of a phishing operation that abused the CERT-UA brand to trick people into installing malware disguised as protection software. According to the agency, the activity was tied to UAC-0255 and relied on emails sent on March 26 and 27 to a broad mix of targets, including public sector bodies, healthcare providers, ]]></description><link>https://www.bitdefender.com/en-us/blog/hotforsecurity/cert-ua-emails-agewheeze-phishing</link><guid isPermaLink="false">69ce50222fa53a9f2eef5aee</guid><category><![CDATA[Industry News]]></category><category><![CDATA[Ukraine]]></category><dc:creator>Vlad CONSTANTINESCU</dc:creator><pubDate>Thu, 02 Apr 2026 11:19:20 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/hotforsecurity/content/images/2026/04/le-vu-vSlCNmZdjHQ-unsplash.jpg" medium="image"/><content:encoded><![CDATA[A CERT-UA spoofing campaign used fake security tools to spread remote access malware to numerous email addresses.


CERT-UA used as a phishing lure

Ukraine’s cyber defenders are warning of a phishing operation that abused the CERT-UA brand to trick people into installing malware disguised as protection software. According to the agency, the activity was tied to UAC-0255 and relied on emails sent on March 26 and 27 to a broad mix of targets, including public sector bodies, healthcare providers, ]]></content:encoded></item><item><title>Alleged RedLine malware developer extradited to United States</title><description><![CDATA[A man has appeared in federal court in Austin, Texas, after being extradited to the United States to face charges related to his alleged role as a key developer of the notorious RedLine malware.

Prosecutors have charged Armenian national Hambardzum Minasyan with conspiring with others to develop and run RedLine, described by the US Department of Justice as "one of the most prevalent infostealing malware variants in the world."

RedLine can steal a wide variety of information from affected compu]]></description><link>https://www.bitdefender.com/en-us/blog/hotforsecurity/redline-malware-developer-extradited</link><guid isPermaLink="false">69ccd95c2fa53a9f2eef5962</guid><category><![CDATA[Industry News]]></category><dc:creator>Graham CLULEY</dc:creator><pubDate>Wed, 01 Apr 2026 08:38:44 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/hotforsecurity/content/images/2026/04/redline.jpeg" medium="image"/><content:encoded><![CDATA[A man has appeared in federal court in Austin, Texas, after being extradited to the United States to face charges related to his alleged role as a key developer of the notorious RedLine malware.

Prosecutors have charged Armenian national Hambardzum Minasyan with conspiring with others to develop and run RedLine, described by the US Department of Justice as "one of the most prevalent infostealing malware variants in the world."

RedLine can steal a wide variety of information from affected compu]]></content:encoded></item><item><title>The Scam That Tricks You Into Infecting Your Own Mac</title><description><![CDATA[Update to macOS Tahoe 26.4 today!

Apple’s latest macOS update came with no flashy headlines — but it did introduce a small security feature that tackles a very real and fast-growing threat.

With macOS 26.4, Apple is now warning users before they paste potentially dangerous commands into the Terminal app. On the surface, it’s a minor tweak. In practice, it directly targets one of today’s most effective social engineering techniques: ClickFix attacks.


Key takeaways:


 * 
   
   
   Attackers ]]></description><link>https://www.bitdefender.com/en-us/blog/hotforsecurity/the-clickfix-scam-infect-your-own-mac</link><guid isPermaLink="false">69cbb32c2fa53a9f2eef58a7</guid><category><![CDATA[Industry News]]></category><category><![CDATA[Threats]]></category><dc:creator>Filip TRUȚĂ</dc:creator><pubDate>Tue, 31 Mar 2026 11:57:05 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/hotforsecurity/content/images/2026/03/iPhone-and-iMac-3.jpg" medium="image"/><content:encoded><![CDATA[Update to macOS Tahoe 26.4 today!

Apple’s latest macOS update came with no flashy headlines — but it did introduce a small security feature that tackles a very real and fast-growing threat.

With macOS 26.4, Apple is now warning users before they paste potentially dangerous commands into the Terminal app. On the surface, it’s a minor tweak. In practice, it directly targets one of today’s most effective social engineering techniques: ClickFix attacks.


Key takeaways:


 * 
   
   
   Attackers ]]></content:encoded></item><item><title>Iranian hackers breach FBI director's personal email, and post his CV and photos online</title><description><![CDATA[It's not every day that you read that the head of America's top law enforcement agency has been hacked, but then - these aren't ordinary times.

The FBI has confirmed that Iran-linked hackers have broken into the personal email inbox of FBI Director Kash Patel, and published photos of him as well as other stolen documents.

The Handala hacking group, a pro-Iranian, pro-Palestinian hacktivist operation, has published on its website a series of personal photographs of Kash Patel :sniffing and smok]]></description><link>https://www.bitdefender.com/en-us/blog/hotforsecurity/iranian-hackers-breach-fbi-directors-personal-email-post-cv-and-photos-online</link><guid isPermaLink="false">69cb760c2fa53a9f2eef5878</guid><category><![CDATA[Industry News]]></category><dc:creator>Graham CLULEY</dc:creator><pubDate>Tue, 31 Mar 2026 07:22:43 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/hotforsecurity/content/images/2026/03/kash-patel.jpeg" medium="image"/><content:encoded><![CDATA[It's not every day that you read that the head of America's top law enforcement agency has been hacked, but then - these aren't ordinary times.

The FBI has confirmed that Iran-linked hackers have broken into the personal email inbox of FBI Director Kash Patel, and published photos of him as well as other stolen documents.

The Handala hacking group, a pro-Iranian, pro-Palestinian hacktivist operation, has published on its website a series of personal photographs of Kash Patel :sniffing and smok]]></content:encoded></item></channel>
        </rss>