Search This Blog

Powered by Blogger.

Blog Archive

Labels

Footer About

Footer About

Labels

Showing posts with label Security Breach. Show all posts

Google Probes Weeks-Long Security Breach Linked to Contractor Access

 




Google has launched a detailed investigation into a weeks-long security breach after discovering that a contractor with legitimate system privileges had been quietly collecting internal screenshots and confidential files tied to the Play Store ecosystem. The company uncovered the activity only after it had continued for several weeks, giving the individual enough time to gather sensitive technical data before being detected.

According to verified cybersecurity reports, the contractor managed to access information that explained the internal functioning of the Play Store, Google’s global marketplace serving billions of Android users. The files reportedly included documentation describing the structure of Play Store infrastructure, the technical guardrails that screen malicious apps, and the compliance systems designed to meet international data protection laws. The exposure of such material presents serious risks, as it could help malicious actors identify weaknesses in Google’s defense systems or replicate its internal processes to deceive automated security checks.

Upon discovery of the breach, Google initiated a forensic review to determine how much information was accessed and whether it was shared externally. The company has also reported the matter to law enforcement and begun a complete reassessment of its third-party access procedures. Internal sources indicate that Google is now tightening security for all contractor accounts by expanding multi-factor authentication requirements, deploying AI-based systems to detect suspicious activities such as repeated screenshot captures, and enforcing stricter segregation of roles and privileges. Additional measures include enhanced background checks for third-party employees who handle sensitive systems, as part of a larger overhaul of Google’s contractor risk management framework.

Experts note that the incident arrives during a period of heightened regulatory attention on Google’s data protection and antitrust practices. The breach not only exposes potential security weaknesses but also raises broader concerns about insider threats, one of the most persistent and challenging issues in cybersecurity. Even companies that invest heavily in digital defenses remain vulnerable when authorized users intentionally misuse their access for personal gain or external collaboration.

The incident has also revived discussion about earlier insider threat cases at Google. In one of the most significant examples, a former software engineer was charged with stealing confidential files related to Google’s artificial intelligence systems between 2022 and 2023. Investigators revealed that he had transferred hundreds of internal documents to personal cloud accounts and even worked with external companies while still employed at Google. That case, which resulted in multiple charges of trade secret theft and economic espionage, underlined how intellectual property theft by insiders can evolve into major national security concerns.

For Google, the latest breach serves as another reminder that internal misuse, whether by employees or contractors remains a critical weak point. As the investigation continues, the company is expected to strengthen oversight across its global operations. Cybersecurity analysts emphasize that organizations managing large user platforms must combine strong technical barriers with vigilant monitoring of human behavior to prevent insider-led compromises before they escalate into large-scale risks.



Call-Recording App Neon Suspends Service After Security Breach

 

Neon, a viral app that pays users to record their phone calls—intending to sell these recordings to AI companies for training data—has been abruptly taken offline after a severe security flaw exposed users’ personal data, call recordings, and transcripts to the public.

Neon’s business model hinged on inviting users to record their calls through a proprietary interface, with payouts of 30 cents per minute for calls between Neon users and half that for calls to non-users, up to $30 per day. The company claimed it anonymized calls by stripping out personally identifiable information before selling the recordings to “trusted AI firms,” but this privacy commitment was quickly overshadowed by a crippling security lapse.

Within a day of rising to the top ranks of the App Store—boasting 75,000 downloads in a single day—the app was taken down after researchers discovered a vulnerability that allowed anyone to access other users’ call recordings, transcripts, phone numbers, and call metadata. Journalists found that the app’s backend was leaking not only public URLs to call audio files and transcripts but also details about recent calls, including call duration, participant phone numbers, timing, and even user earnings.

Alarmingly, these links were unrestricted—meaning anyone with the URL could eavesdrop on conversations—raising immediate privacy and legal concerns, especially given complex consent laws around call recording in various jurisdictions.

Founder and CEO Alex Kiam notified users that Neon was being temporarily suspended and promised to “add extra layers of security,” but did not directly acknowledge the security breach or its scale. The app itself remains visible in app stores but is nonfunctional, with no public timeline for its return. If Neon relaunches, it will face intense scrutiny over whether it has genuinely addressed the security and privacy issues that forced its shutdown.

This incident underscores the broader risks of apps monetizing sensitive user data—especially voice conversations—in exchange for quick rewards, a model that has emerged as AI firms seek vast, real-world datasets for training models. Neon’s downfall also highlights the challenges app stores face in screening for complex privacy and security flaws, even among fast-growing, high-profile apps.

For users, the episode is a stark reminder to scrutinize privacy policies and app permissions, especially when participating in novel data-for-cash business models. For the tech industry, it raises questions about the adequacy of existing safeguards for apps handling sensitive audio and personal data—and about the responsibilities of platform operators to prevent such breaches before they occur.

As of early October 2025, Neon remains offline, with users awaiting promised payouts and a potential return of the service, but with little transparency about how (or whether) the app’s fundamental security shortcomings have been fixed.

Maryland’s Paratransit Service Hit by Ransomware Attack

 

The Maryland Transit Administration (MTA), operator of one of the largest multi-modal transit systems in the United States, is currently investigating a ransomware attack that has disrupted its Mobility paratransit service for disabled travelers. 

While the agency’s core transit services—including Local Bus, Metro Subway, Light Rail, MARC, Call-A-Ride, and Commuter Bus—remain operational, the ransomware incident has left the MTA unable to accept new ride requests for its Mobility service, which is critical for individuals with disabilities who rely on specialized transportation. 

According to the MTA, the cybersecurity breach involved unauthorized access to certain internal systems. The agency is working closely with the Maryland Department of Information Technology to assess and mitigate the impact. Riders who had already scheduled Mobility trips prior to the attack will still receive their services as planned. However, until the issue is resolved, new bookings cannot be processed through the standard Mobility system.

In response to the disruption, the MTA is directing eligible customers to its Call-A-Ride program as an alternative. This service can be accessed online or by phone, providing a temporary solution for those in need of transportation while the Mobility system remains unavailable for new requests.

The agency has emphasized its commitment to resolving the incident quickly and securely, promising regular updates as more information becomes available. 

This incident is not isolated. Over the past two years, similar ransomware attacks have targeted paratransit and public transit services in multiple states, including Missouri and Virginia, often leaving municipalities to scramble for alternative solutions for disabled residents.

The MTA has stated that its primary focus is on ensuring the safety and security of both customers and employees. It is collaborating with government partners and media outlets to keep the public informed and to support affected communities throughout the recovery process. 

The MTA’s experience underscores the growing risk that ransomware poses to critical public infrastructure, particularly services that support vulnerable populations. As investigations continue, the agency urges customers to stay informed through official channels and to utilize available alternatives like Call-A-Ride until normal operations can resume.

Pandora Admits Customer Data Compromised in Security Breach


 

A major player in the global fashion jewellery market for many years, Pandora has long been positioned as a dominant force in this field as the world's largest jewellery brand. However, the luxury retailer is now one of a growing number of companies that have been targeted by cybercriminals. 

Pandora confirmed on August 5, 2025, that a cyberattack had been launched on the platform used to store customer data by a third party. A Forbes report indicates that the breach was caused by unauthorised access to basic personal information, including customer name and email address. As a result, no passwords, credit card numbers, or any other sensitive financial information were compromised, the company stressed. 

In response to the incident, Pandora has taken steps to contain it, improved its security measures, and stated that at the present time, no evidence has been found that suggests that the stolen information has been leaked or misused. There is no doubt that supply chain dependencies can be a vulnerability for attackers due to the recent breach at Danish jewellery giant Pandora, as evidenced by this breach. 

The incident, rather than being the result of a direct intrusion into Pandora's core infrastructure, has been traced back to a third-party vendor platform — a reminder of the vulnerability of external services, including customer relationship management tools and marketing automation systems, which can be used by hackers as gateways. 

Using this tactic, cybercriminals were able to gain unauthorised access to customer data. Cybercriminals often employ this tactic to facilitate secondary crimes such as phishing, identity theft, and targeted scams. This incident is part of a broader industry challenge, with organisations increasingly outsourcing critical functions while ignoring the security risks associated with these outsourcing agreements. 

However, Pandora has not revealed who the third-party platform is; however, it has confirmed that some of Pandora's customer information was accessed through it, so the company's core internal systems remained unaffected by the intrusion. According to the jewellery retailer, the intrusion has been swiftly contained, and additional security measures have been put in place in order to ensure that future attacks do not occur again. 

According to the investigation, only the most common types of data - the names, dates, and email addresses of customers - were copied, and there was no compromise of passwords, identity documents or financial information. Several researchers have noted that cybercriminals have been orchestrating social engineering campaigns on behalf of companies and help desks for as long as January 2025, often to obtain Salesforce credentials or trick the staff into authorising malicious OAuth applications. 

It is not the only issue that is concerning the retail sector, as Chanel, a French fashion and cosmetics giant, also confirmed earlier this month a cyberattack perpetrated by the ShinyHunter extortion group, reportedly targeting Salesforce applications on August 1 through a social media-based intrusion, causing a significant amount of disruption in the industry. 

In the last year, the UK retail sector has been experiencing challenges as a result of cyberattacks that have affected major brands such as M&S, Harrods, and The Co-op. This latest incident comes at a time when the retail sector has been facing an increasing number of cyberattacks. A breach earlier this year resulting in the theft of customer data led M&S to declare a loss of around £300 million for its annual profit. 

It has been noted that in recent years, retailers have become prime targets for sophisticated hackers due to the vast amounts of consumer information they collect for marketing purposes and the outdated security infrastructure they use. Many retailers have underinvested in cybersecurity resilience in their pursuit of speed, scale, and convenience, which is something well-organised threat actors, such as Scattered Spider, are exploiting by taking advantage of this gap. 

Cybersecurity expert Christoph Cemper advised Pandora customers to remain vigilant against potential phishing emails, warning that such attacks can lead to the theft of sensitive information or financial losses if recipients click malicious links or download harmful attachments. Pandora reaffirmed its commitment to data protection, stating, Cemper, however, emphasised that retailers must adopt more proactive measures to safeguard customer information. 

Despite this incident, Pandora stressed the importance of not compromising passwords, payment information, or other sensitive details of customers. Specifically, the incident only involved “very common types of customer data”, including names and e-mail addresses, with no compromises to passwords, payment information, or other sensitive information. 

As a result of its investigation, the company stated that no evidence of misuse of the stolen data was found, but it advised customers to remain vigilant, especially in situations where they receive unsolicited emails or ask for personal information online. In its warning to customers, Pandora advised them not to click on unfamiliar links or download attachments from unverified sources. 

Pandora did not specify who was responsible for the intrusion, how the hack was executed, or how many people had been affected. Nonetheless, security researchers have been able to link the incident to the ShinyHunters group, which is said to have targeted corporate Salesforce databases with various social engineering and phishing techniques since January 2025. 

Several of the members of this group claim that they will "perform a mass sale or leak" of data from companies unwilling to comply with ransom demands. As far as Salesforce is concerned, the company has not been compromised. Its statement attributed these breaches instead to sophisticated phishing attacks and social engineering attacks that have become increasingly sophisticated over the years, reiterating that customers are responsible for safeguarding their data on their own. 

Today's interconnected retail environment serves as a reminder that cyber risks are no longer confined to a company's own network perimeter but are now a part of a company's wider digital footprint. It has become increasingly apparent that the lines between internal and external security responsibilities are blurring in light of the increasing use of vulnerability in third-party platforms, social engineering tactics, and overlooked digital entry points. 

The stakes for global brands are not limited to immediate disruption to operations. In addition to consumer trust, brand reputation, and regulatory scrutiny, cybersecurity experts agree that a holistic approach is now needed in order to mitigate cyberattacks. In addition to rigorous vendor risk assessments, continuous employee training, advanced threat detection, and resilient incident response frameworks, these strategies are all important. 

In an industry like luxury retail that is vulnerable to cyberattacks, Pandora's experience demonstrates what is becoming an increasingly common industry imperative: proactive defences are becoming not just an option but an essential tool for safeguarding the online relationships of customers and protecting their digital assets.

Akira Ransomware Wave Targets SonicWall Firewall Devices

 

Cybersecurity firms report a late-July surge of Akira ransomware intrusions against SonicWall firewall devices, with evidence pointing to attackers entering via SonicWall SSL VPN connections and rapidly moving to encrypt data shortly after gaining access. 

While a previously unknown vulnerability is considered highly plausible, researchers have not ruled out credential-based entry methods such as brute force, dictionary attacks, or credential stuffing. Given the uncertainty, defenders are advised to temporarily disable SonicWall SSL VPN, enhance logging and endpoint monitoring, and block VPN authentications from hosting providers until patches or clearer guidance are available. 

Arctic Wolf detected these SonicWall-linked VPN intrusions beginning July 15, noting that malicious logins have a history dating back to at least October 2024, and that attackers often authenticate from virtual private server infrastructure rather than consumer ISPs. Huntress corroborated Arctic Wolf’s findings and shared indicators of compromise, while additional community discussion appeared on Reddit. The campaign highlights a rapid transition from initial VPN access to encryption, consistent with recent Akira activity patterns. 

Additionally, SonicWall urged customers to patch SMA 100 appliances for a separate critical flaw (CVE-2025-40599) that could allow remote code execution if an attacker already has admin rights. Although there was no evidence that CVE-2025-40599 was being exploited, Google’s Threat Intelligence Group reported adversaries using compromised credentials to deploy a new OVERSTEP rootkit on these devices. SonicWall advised SMA 100 customers to check GTIG’s IOCs, scrutinize logs for suspicious access, and contact support if compromise is suspected. 

Akira, active since March 2023, has claimed more than 300 victims on its leak site, including high-profile organizations, and the FBI estimated over $42 million in ransom payments from more than 250 victims as of April 2024. With the current SonicWall-focused wave still under investigation, security teams are urged to harden remote access, enable detailed monitoring, and be prepared for rapid containment if suspicious VPN activity is detected.

Security Breach Reveals "Catwatchful" Spyware is Snooping on Users

Security Breach Reveals "Catwatchful" Spyware is Snooping on Users

A security bug in a stealthy Android spyware operation, “Catwatchful,” has exposed full user databases affecting its 62,000 customers and also its app admin. The vulnerability was found by cybersecurity expert Eric Daigle reported about the spyware app’s full database of email IDs and plaintext passwords used by Catwatchful customers to access stolen data from the devices of their victims. 

Most of the victims were based in India, Argentina, Peru, Mexico, Colombia, Bolivia, and Ecuador. A few records date back to 2018. The leaked database also revealed the identity of the Catwatchful admin called Omar Soca Char.

The Catwatchful database also revealed the identity of the spyware operation’s administrator, Omar Soca Charcov, a developer based in Uruguay.

About Catwatchful

Catwatchful is a spyware that pretends to be a child monitoring app, claiming to be “invisible and can not be detected,” while it uploads the victim’s data to a dashboard accessible to the person who planted the app. The stolen data includes real-time location data, victims’ photos, and messages.  The app can also track live ambient audio from the device’s mic and access the phone camera (both front and rear).

Catwatchful and similar apps are banned on app stores, and depend on being downloaded and deployed by someone having physical access to a victim’s phone. These apps are famous as “stalkerware” or “spouseware” as they are capable of unauthorized and illegal non-consensual surveillance of romantic partners and spouses. 

Rise of spyware apps

The Catwatchful incident is the fifth and latest in this year’s growing list of stalkerware scams that have been breached, hacked, or had their data exposed. 

How was the spyware found?

Daigle has previously discovered stalkerware exploits. Catwatchful uses a custom-made API, which the planted app uses to communicate to send data back to Catwatchful servers. The stalkerware also uses Google Firebase to host and store stolen data. 

According to Techradar, the “data was stored on Google Firebase, sent via a custom API that was unauthenticated, resulting in open access to user and victim data. The report also confirms that, although hosting had initially been suspended by HostGator, it had been restored via another temporary domain."

Recognizing the Messages That Signal a Security Breach

 


Increasingly, cybersecurity experts warn that using traditional antimalware tools can lead to a false sense of security if used in conjunction with a system of prevention. In today's rapidly evolving threat environment, this software remains a staple of personal and enterprise protection strategies. However, its limitations have become painfully obvious as the threat environment rapidly evolves. 

There is no doubt in my mind that signature-based scanners, in particular, are notoriously unreliable, particularly when faced with newly released exploits and malware variants—especially when they have just been released. One way to see the impact of this problem is to submit a suspicious file to Google's VirusTotal service, which aggregates results from 60 of the most trusted anti-malware engines in the world, but the detection rates are sometimes inconsistent and shockingly low even there. 

A major issue facing cybercriminals is the fact that they no longer have to rewrite malicious code in order to evade detection. In many cases, they are only necessary to rearrange a few bytes or make minor adjustments to render the threat completely invisible to traditional scanners, thus enhancing the accuracy of the scan. 

In order to increase accuracy, security vendors have added new layers of defence to their systems. The majority of antimalware solutions are now based on heuristic algorithms, which use analysis of program behaviour in order to identify suspicious activity rather than solely on known signatures in order to identify malicious software. 

Other companies also use virtualised sandboxes to observe files in isolation, monitor system processes in real-time, and analyse network traffic to detect threats. Although there have been significant advances in defending against cyber attacks, attackers continue to develop new techniques faster than defences can respond. The reality is that no single security product matter how advanced-can detect or block every cyber threat with total reliability. 

As malware is constantly mutating and adversaries are constantly refining their techniques at unprecedented speeds, organizations and individuals alike will need to adopt a more comprehensive approach to security. It will go well beyond simply installing antimalware software to ensure security goes well. 

The term security breach is generally understood as any incident in which sensitive data, networks, computer systems, or devices are accessed, disclosed, or tampered with without the authorization of the party involved. Such breaches do much more than simply cause inconveniences; they threaten data integrity, personal privacy, and organizational confidentiality in a way that goes far beyond mere inconveniences. 

In today's digital society where every aspect of life, including financial transactions, shopping, social interaction, and entertainment, is facilitated through online platforms, the stakes are much higher than ever. In many cases, individuals entrust their most private information with digital services and presume they will be protected by robust safeguards, which is why they trust digital services so much with their sensitive information. 

However, the reality is that as the volume and value of stored data increase, the incentive for malicious actors to exploit vulnerabilities will also increase. It is no secret that cybercriminals have been relentlessly targeting databases and applications to harvest data, such as personal information, payment information, and login credentials, all of which can then be exploited in order to commit identity thefts, financial frauds, and other sophisticated forms of cybercrime. 

For organizations, the impact of a security breach will be even greater. A compromised system does not only disrupt operations immediately, but it can also cause significant financial losses, regulatory penalties, and costly legal actions. Perhaps the most damaging of these effects, however, is the erosion of customer trust and corporate reputation, which can take years to restore. 

There is a growing awareness that security and data breach risks are not abstract threats but are in fact pressing realities that require vigilant prevention, prompt detection, and effective response measures for both businesses and individuals alike. It has been reported recently by cybersecurity company ESET that the frequency of such threats has been on the rise in recent years as a result of the escalation of these threats. 

According to the company's latest Threat Report, this has now occurred in greater numbers. There have been numerous warnings issued over the past few months regarding the increase in spam and viral outbreaks, but one of the most alarming aspects of these campaigns is that they continue to ensnare unsuspecting users despite their obvious simplicity and ease of recognition in theory. 

The ESET report demonstrates the fact that the ClickFix attacks have evolved into a highly adaptable and formidable threat, employing a wide array of malicious payloads, from info stealers to ransomware to sophisticated nation-state malware. While these attack methodologies can be applied to a variety of operating systems, Windows PCs remain the most susceptible and effective targets due to the prevalence and effectiveness of these techniques. 

A key component of ClickFix is a deceptively simple yet remarkably effective method of getting victims to fix their problems. Victims are typically instructed to open the Windows Run dialogue by pressing the Windows key plus "R," paste a string of text using Ctrl + V and press "Enter" – often under the pretext of resolving an urgent issue. 

However, while the initial script may seem harmless, it is often just a way of obtaining and silently executing a much more dangerous payload without the knowledge of the user. Performing this single action can be a gateway to a wide variety of malicious programs, including the Lumma Stealer, VidarStealer, StealC, Danabot, and many more information theft programs; remote access Trojans like VenomRAT, AsyncRAT, and NetSupport RAT; and several other tools designed to attack the user. 

There are crypto miners, clipboard hijackers, post-exploitation frameworks like Havoc and Cobalt Strike, and other specialised attack tools in this category. Security professionals have given unequivocal advice: Users should treat any unsolicited prompt urging them to perform this sequence of commands as an immediate red flag that indicates a deliberate attempt to compromise their system. 

Under any circumstances, users should be cautious of following such instructions, as they can result in a significant compromise. In order to avoid any potential problems with the application in question, users should immediately close, or force-quit, restart their computers, and then run a thorough antivirus scan. Furthermore, it is necessary to change all of the key account passwords and monitor financial statements for signs of suspicious activity. 

While ClickFix attacks are most commonly associated with Windows environments, ESET's findings serve as a timely reminder that Macs are not immune to these attacks either. It has been reported that similar social engineering tactics can be used to entice macOS users to run scripts that appear benign but, in reality, facilitate unauthorized access to their devices. 

It demonstrates how important it is to remain cautious when dealing with uninvited technical instructions, regardless of the platform that users are using. ESET, a cybersecurity company that issued a recent alert regarding the increase in these threats, has indicated in its latest Threat Report that these attacks have now risen dramatically in frequency, which is in line with other previous warnings that have been issued over the past few months. 

However, what is even more alarming about these campaigns is the persistent manner in which they continue to ensnare unsuspecting users, even though these campaigns, in theory, should be easily recognised and avoided. The ESET report demonstrates the fact that the ClickFix attacks have evolved into a highly adaptable and formidable threat, employing a wide array of malicious payloads, from info stealers to ransomware to sophisticated nation-state malware.

While these attack methodologies can be applied to a variety of operating systems, Windows PCs remain the most susceptible and effective targets due to the prevalence and effectiveness of these techniques. Despite its deceptive simplicity, ClickFix's core tactic is remarkably effective as well. When victims are contacted to resolve an urgent issue, they are typically instructed to open the Windows Run dialogue by pressing the Windows key plus the "R" and then to paste a string of text using "Ctrl + V" before pressing "Enter." 

Although it may initially seem harmless or routine, the script usually serves as a conduit for retrieving and silently executing a far more dangerous payload, without the user being aware of it. By taking this action, users will be allowing themselves to be infected by a wide variety of malicious programs, such as Lumma Stealers, Vidar Stealers, StealC, Danabots, and many more. Remote Access Trojans, such as VenomRAT, AsyncRAT, and NetSupport RA, are some of the most prominent ones, along with cryptominers, clipboard hijackers, post-exploitation frameworks like Havoc and Cobalt Strike, and a variety of other specialised tools. 

Security professionals have given unequivocal advice: Users should treat any unsolicited prompt urging them to perform this sequence of commands as an immediate red flag that indicates a deliberate attempt to compromise their system. Under any circumstances, users should be cautious of following such instructions, as they can result in a significant compromise. As a matter of fact, they should close or force-quit the application in question, reboot the system, and carry out a thorough antivirus scan immediately. 

Additionally, it is essential that all critical account passwords be changed and that all financial statements be monitored closely for signs of suspicious activity. It has been found that ClickFix attacks are most common on Windows-based operating systems, but ESET's findings serve as a timely reminder that Mac users are not entirely immune to these attacks. 

The same social engineering techniques are used to trick Mac users into running scripts ostensibly benign by guiding them in a way that facilitates unauthorized access to their devices. This reinforces the crucial need to be vigilant and sceptical when dealing with any unsolicited technical instructions, regardless of the platform. For security breaches to be minimized and an effective response mounted promptly, it is important to recognize early signs of a breach. 

Several warning signs often point towards unauthorized activity within a system or network. Unusual network behaviour, such as sudden spikes in data traffic, irregular transfers, or sudden surges in bandwidth, can be a sign of an intentional data exfiltration or malicious probing of the network. In addition to unexplained system problems, including unexplained slowdowns, frequent crashes, or prolonged downtime, it is possible for malware to exploit these vulnerabilities. 

Suspicious account activity can also raise concerns. It is usually a sign of active compromise or credential theft when a user account appears unfamiliar, logins are made at odd hours, or repeated attempts are made to log in at odd hours. As a last point to note, data anomalies can be an indication that there has been a security breach. Missing, altered, or corrupted files are evidence that there has been an attack, as are access logs that indicate the entry of unauthorized individuals into sensitive databases.

By recognizing these signs and responding swiftly, organizations can better protect their data, operations, and reputation against the increasing threats of cyber-attacks. The threat landscape is becoming increasingly complex, and as a result, individuals and organisations are faced with a need to take an increasingly proactive and layered approach to cybersecurity. It has never been more important. 

As a result, we must go beyond conventional security tools and take deliberate steps to harden systems, train users, and prepare for contingencies besides conventional tools. When users create robust incident response procedures, conduct regular security audits, and invest in employee training, they can significantly reduce the chance that simple social engineering techniques or undetected malware will succeed, thereby reducing the likelihood that they will succeed. 

It is equally important for the organisation to utilise threat intelligence feeds, maintain current software, and enforce strong access controls to remain on top of an adversary that is continually refining its methods. A culture of security awareness is crucial for organizations to create where all users are aware that vigilance is not optional but rather a shared responsibility, which is why organizations should cultivate it. 

The businesses, as well as the individuals, can strengthen their defenses, and make sure that when the next attempt comes—and it will—they will be ready to detect, contain, and recover quickly, as the next attempt will be a result of the combination of modern technologies, disciplined operational practices, and a mindset that emphasizes continuous improvement.

Experts Warn Trump Officials Using Signal for War Plans Risk Massive Leaks

 

Reports that senior Trump administration officials discussed classified military operations using the encrypted texting app Signal have raised serious security concerns. Although Signal provides encryption, lawmakers and cybersecurity specialists have warned that it is still susceptible to hacking and should never be used for private government communications. 

When journalist Jeffrey Goldberg of The Atlantic was accidentally included in a Signal group discussion where senior Trump officials were discussing military operations in Yemen, the issue became apparent. Goldberg called the conversation an act of "shocking recklessness" and said it included "precise information about weapons packages, targets, and timing.” 

Mark Montgomery, senior director of the Foundation for Defence of Democracies, criticised the decision, saying, "I guess Signal is a few steps above leaving a copy of your war plan at the Chinese Embassy—but it's far below the standards required for discussing any elements of a war plan.” 

Signal has become increasingly popular in Washington despite cybersecurity concerns after Chinese-affiliated hackers significantly compromised U.S. telecommunications networks. To safeguard against spying, officials recommend using encrypted services such as Signal. Experts warn that even while the app has robust encryption and deletes messages automatically, it is not approved for use in government-level sensitive communications. 

Lawmakers call for investigation

Top Democrats have slammed the use of Signal for military discussions, describing it as a significant security breach. Bennie Thompson (D-Miss.), the ranking member of the House Homeland Security Committee, criticised the Trump administration for failing to vet group chat users. “It should go without saying that administration officials should not be using Signal for discussing intelligence matters,” Thompson noted. 

House Foreign Affairs Committee Ranking Member Gregory Meeks (D-N.Y.) has requested a hearing, calling the episode "the most astonishing breach of our national security in recent history." Ranking member of the House Intelligence Committee, Jim Himes (D-Conn.), said he was "horrified" by the usage of an insecure app. He cautioned that lower-level officials might risk criminal charges for such a failure. 

Michael Waltz, Trump's National Security Adviser, admits to organising the Signal group chat, which inadvertently included writer Jeffrey Goldberg. Waltz first blamed a staff member, but later admitted that he founded the group himself. "It is embarrassing, definitely. We're going to get to the bottom of it," he added, adding that he was engaging Elon Musk on technical matters. 

In support of Waltz, Trump described him as a "good man" who had only "learnt a lesson." "The leak was the only glitch in two months, and it turned out not to be a serious one," he said, downplaying the breach as a small mistake. But there has been a quick pushback, with lawmakers and security experts voicing serious concerns.