Yazılar

Odido Hack Data Leaked

A hacking group has begun releasing customer information following a major cyberattack on Dutch telecom provider Odido.

The breach reportedly involved personal data linked to millions of users, including contact details and identification-related information. Authorities and cybersecurity specialists are currently investigating the incident.

Odido stated that it will not enter into negotiations with the attackers, aligning with guidance from law enforcement agencies that advise against ransom payments.

Officials noted that compliance with such demands does not guarantee the deletion of compromised data and may encourage further criminal activity.

The situation highlights ongoing challenges faced by telecommunications providers in safeguarding sensitive information amid rising cyber threats.

BlackBerry Lifts Revenue Forecast on Strong Cybersecurity Demand

BlackBerry raised its fiscal 2026 revenue forecast on Thursday, citing robust demand for its cybersecurity software as businesses step up defenses against rising cyber threats fueled by advances in artificial intelligence.

The Canadian company now expects annual revenue of $519 million to $541 million, up from its previous range of $508 million to $538 million.

BlackBerry reported second-quarter revenue of $129.6 million, topping analysts’ estimates of $122.1 million, according to LSEG data. The company also posted earnings of 2 cents per share, compared with a loss of 3 cents a year earlier.

Enterprises have been investing heavily in cybersecurity software to protect digital infrastructure as hackers exploit new vulnerabilities. This trend has helped BlackBerry’s software business remain resilient even amid a challenging tech spending environment.

Following the announcement, BlackBerry’s U.S.-listed shares rose about 2% in premarket trading.

North Korean Hackers Using Fake Job Offers to Steal Cryptocurrency, Research Shows

North Korean hackers are increasingly impersonating recruiters to steal cryptocurrency, saturating the industry with convincing fake job offers, according to new research and interviews conducted by Reuters. The cyber campaign, dubbed “Contagious Interview” by cybersecurity firms, has grown so pervasive that many applicants now screen recruiters to ensure they are not acting on behalf of Pyongyang.

Experts say North Korea stole at least $1.34 billion in cryptocurrency last year, funding its sanctioned weapons program. The FBI has previously warned that Pyongyang was “aggressively” targeting the crypto industry with elaborate social engineering schemes.

The scams typically begin on LinkedIn or Telegram, with a recruiter offering a role at a major blockchain or crypto firm. Applicants are then directed to obscure websites to complete a skills test or record a video—sometimes requiring them to download malicious code. In one case, a U.S. product manager lost $1,000 in ether and Solana after sending a video to a fake recruiter impersonating Ripple Labs. Others, like consultant Ben Humbert, cut off conversations after being asked to complete “virtual interviews” through suspicious links.

Companies such as Robinhood and Kraken have acknowledged being impersonated. Robinhood said it acted to disable fake web domains linked to the scam. LinkedIn and Telegram confirmed that the fraudulent accounts identified by Reuters had been removed. Still, security experts say the impersonations are difficult to police, as “anybody out there can say they’re a recruiter,” noted Nick Percoco, Kraken’s chief security officer.

Research by SentinelOne and Validin found exposed hacker log files containing details of more than 230 targeted individuals—ranging from coders and consultants to executives—between January and March. Analysts linked the activity to North Korea based on IP addresses and emails tied to previous state-backed hacks.

Although only a fraction of North Korea’s overall crypto theft efforts, experts warn the campaign is highly organized and rapidly evolving. “It’s scary how far they’ve come,” said Carlos Yanez of Global Ledger, one of the recent targets.

North Korea’s mission to the United Nations did not respond to Reuters’ request for comment, though Pyongyang routinely denies involvement in cryptocurrency theft.