Author: Ambreen Chaudhary

Ambreen Chaudhary is a Cyber Crime expert dedicated to raising awareness about cybersecurity and promoting digital safety. With a strong background in cyber laws and online threat prevention, she offers valuable insights to help individuals and businesses protect themselves in the digital age.

The mystery behind the notorious USDoD hacker group has finally been solved. Investigations by cybersecurity experts, including CrowdStrike and Predicta Lab, have revealed that a Brazilian national led this group, shedding light on years of cyberattacks and data breaches. Who Is Behind the USDoD Hacker Group The USDoD hacker group gained global attention for leaking sensitive data from high-profile organizations. These included the FBI’s InfraGard portal, Airbus, TransUnion, and background checking services like National Public Data. Recently, a Brazilian cybersecurity investigation identified the hacker as Luan B.G., a 33-year-old man from Minas Gerais, Brazil. Although he used multiple online identities,…

Read More

The Conduent cyberattack came to light after multiple U.S. government agencies reported service outages and disruptions linked to the company. The incident, which began around mid-January 2025, affected key government functions in at least four states, prompting concern over the resilience of third-party service providers supporting public infrastructure. What Happened in the Conduent Cyberattack? The first signs of trouble emerged on January 11, when Oklahoma Human Services revealed that its Conduent-powered customer service line was experiencing a prolonged technical issue. A few days later, the Wisconsin Department of Children and Families expanded on this, citing a “global network issue” affecting…

Read More

Planning a European getaway? Don’t forget to pack your cyber smarts along with your passport. While stunning architecture and rich culture await, so do common travel hiccups like phone theft, identity fraud, and data breaches. And guess what? These digital disasters often strike when you’re simply sipping coffee at a sidewalk café or navigating through a crowded train station. Renowned travel expert Rick Steves has long been a beacon for smart, safe European adventures. But beyond pickpocket-proof clothing and culturally immersive itineraries, his insights now focus on digital safety—especially when it comes to your smartphone. With a few taps in…

Read More

The Patelco cyber attack was officially identified on June 29, 2024, when the credit union took key banking systems offline. This sudden shutdown disrupted online banking, mobile app services, and call center operations. According to internal investigation updates, attackers had already gained access as early as May 23. The breach was more than an inconvenience. It resulted in a full-scale data exfiltration event that exposed the private information of more than 1,009,472 individuals. What Personal Information Was Exposed? In filings with the Maine Attorney General’s Office, Patelco first reported the breach impacted 726,000 people. A later update confirmed over 1…

Read More

The latest release of White Rabbit Neo has turned heads across the cybersecurity world. Described as a generative AI tool that can operate like a seasoned red teamer, version 2.5 isn’t just smart, it’s uncensored, fast, and purpose-built for penetration testing and vulnerability exploitation. Available on Hugging Face, this model is designed to identify vulnerabilities, generate exploit code, and provide remediation steps, all in one go. In a field where automation is already a game changer, White Rabbit Neo’s power lies in its open access and dual-use capability. This isn’t a sci-fi preview of AI gone rogue. It’s real, it’s…

Read More

Meta’s latest AI-powered feature for Facebook is raising red flags about personal privacy. The company now asks users to allow the upload of personal photos from their phone’s camera roll to generate AI Story ideas. While positioned as a helpful tool, this development has sparked concern among privacy experts, especially regarding the handling of images never shared on Facebook. This change marks another step in Meta’s broader integration of artificial intelligence across its platforms. What Is the New AI Photo Feature? When a user tries to create a Story, a prompt appears asking for permission to “allow cloud processing.” If…

Read More

Rawalpindi: It was a privilege to be part of an event that wasn’t just a signing ceremony; it marked a shared commitment to progress, innovation, and collaboration. On July 4, 2025, I attended the official MoU signing between the Rawalpindi Chamber of Commerce & Industry (RCCI) and ITSOLERA Pvt Ltd, held at RCCI’s headquarters. This wasn’t simply a formal agreement. It signalled that Pakistan’s business landscape is ready to evolve securely, smartly, and inclusively. A Meaningful Collaboration The agreement was signed by Mr. Usman Shaukat, President of RCCI, and Dr. Hafeez ur Rehman, CEO of ITSOLERA. Both leaders spoke passionately…

Read More

EU sanctions Russian Hackers in a bold move to counteract rising cyber threats. The European Union has formally sanctioned three Russian nationals believed to be part of GRU Unit 29155, a notorious military intelligence group. These individuals are held responsible for launching targeted cyberattacks on Estonia’s core government ministries, an operation that has significant implications for international cybersecurity and digital sovereignty. These individuals—Nikolay Alexandrovich Korchagin, Vitaly Shevchenko, and Yuriy Fedorovich Denisov—are linked to Russia’s military intelligence, known as GRU Unit 29155. This group is notorious for covert operations and cyber espionage. What Happened? According to the Council of the European…

Read More

Security researchers have discovered a new strain of Telegram C2 malware built using Golang. This backdoor communicates through Telegram’s Bot API to stay hidden, execute commands remotely, and persist on compromised systems , all while evading traditional detection methods. But its also capable of executing multiple commands via an attacker-controlled Telegram channel. Indicators suggest a possible Russian origin, based on linguistic clues embedded within the code. How the Backdoor Works The malware, compiled using the Go programming language, behaves like a typical backdoor once deployed. Upon execution, it checks whether it is running from a specific file path and name:…

Read More

A new Ghostwriter malware campaign is actively targeting Ukrainian government and military institutions, along with Belarusian opposition activists, in a renewed wave of cyber espionage. The campaign uses weaponized Excel documents embedded with obfuscated macros. As revealed by cybersecurity firm SentinelOne, these documents act as entry points for delivering stealthy payloads, including a new version of PicassoLoader. Ghostwriter, also known by aliases like Moonscape, TA445, UAC-0057, and UNC1151, has been active since 2016 and has consistently aligned itself with Russian state interests, spreading disinformation and launching targeted cyber operations across Europe. Ghostwriter Malware Campaign Origins and Targets Prepping Since Mid-2024,…

Read More