Mozilla Updates Firefox Terms Again After Backlash Over Broad Data License Language

Mozilla Updates Firefox Terms Again After Backlash Over Broad Data License Language

Firefox browser maker Mozilla on Friday updated its Terms of Use a second time within a week following criticism overbroad language that appeared to give the company the rights to all information uploaded by users. The revised Terms of Use now states – You give Mozilla the rights necessary to operate Firefox. This includes processing…

Amnesty Finds Cellebrite’s Zero-Day Used to Unlock Serbian Activist’s Android Phone

Amnesty Finds Cellebrite’s Zero-Day Used to Unlock Serbian Activist’s Android Phone

A 23-year-old Serbian youth activist had their Android phone targeted by a zero-day exploit developed by Cellebrite to unlock the device, according to a new report from Amnesty International. “The Android phone of one student protester was exploited and unlocked by a sophisticated zero-day exploit chain targeting Android USB drivers, developed by Cellebrite,” the international…

The Top 50 Ecommerce Startups by Search Growth (Q1 2025)
|

The Top 50 Ecommerce Startups by Search Growth (Q1 2025)

We’ve analyzed 150K websites to find out which ecommerce startups have seen substantial search growth this year. When we see organic traffic growing, it’s a good sign that customer interest is building and brand strategy is hitting the mark. If you want a playbook for growth, our list of the top ecommerce companies can show you whose…

17 Proven SaaS Marketing Strategies From 11 CMOs & Founders
|

17 Proven SaaS Marketing Strategies From 11 CMOs & Founders

Over the past year, we interviewed top SaaS founders and marketing executives on the Ahrefs Podcast. We asked them about strategies that helped them scale. From Crypto.com to Airwallex, Paddle, and Surfer, these battle-tested methods have fueled growth in competitive markets with limited resources. In this article, we share their best insights so you can apply…

Microsoft Exposes LLMjacking Cybercriminals Behind Azure AI Abuse Scheme

Microsoft Exposes LLMjacking Cybercriminals Behind Azure AI Abuse Scheme

Microsoft on Thursday unmasked four of the individuals that it said were behind an Azure Abuse Enterprise scheme that involves leveraging unauthorized access to generative artificial intelligence (GenAI) services in order to produce offensive and harmful content. The campaign, called LLMjacking, has targeted various AI offerings, including Microsoft’s Azure OpenAI Service. The tech giant is…

Space Pirates Targets Russian IT Firms With New LuckyStrike Agent Malware

Space Pirates Targets Russian IT Firms With New LuckyStrike Agent Malware

The threat actor known as Space Pirates has been linked to a malicious campaign targeting Russian information technology (IT) organizations with a previously undocumented malware called LuckyStrike Agent. The activity was detected in November 2024 by Solar, the cybersecurity arm of Russian state-owned telecom company Rostelecom. It’s tracking the activity under the name Erudite Mogwai….

Leaked Black Basta Chat Logs Reveal $107M Ransom Earnings and Internal Power Struggles

Leaked Black Basta Chat Logs Reveal $107M Ransom Earnings and Internal Power Struggles

More than a year’s worth of internal chat logs from a ransomware gang known as Black Basta have been published online in a leak that provides unprecedented visibility into their tactics and internal conflicts among its members. The Russian-language chats on the Matrix messaging platform between September 18, 2023, and September 28, 2024, were initially…

16 Top Search Engines in 2025 (Including Google Alternatives)
|

16 Top Search Engines in 2025 (Including Google Alternatives)

What are the top search engines in the world? It depends on what you’re looking for. Slowly disappearing are the days when just one search engine dominates over the rest. The Internet is fragmenting, and people may choose a search engine over others because of specific use cases. So, here are the top search engines, classified…

5 Active Malware Campaigns in Q1 2025

5 Active Malware Campaigns in Q1 2025

The first quarter of 2025 has been a battlefield in the world of cybersecurity. Cybercriminals continued launching aggressive new campaigns and refining their attack methods. Below is an overview of five notable malware families, accompanied by analyses conducted in controlled environments. NetSupport RAT Exploiting the ClickFix Technique In early 2025, threat actors began exploiting a…

⚡ THN Weekly Recap: From $1.5B Crypto Heist to AI Misuse & Apple’s Data Dilemma

⚡ THN Weekly Recap: From $1.5B Crypto Heist to AI Misuse & Apple’s Data Dilemma

Welcome to your weekly roundup of cyber news, where every headline gives you a peek into the world of online battles. This week, we look at a huge crypto theft, reveal some sneaky AI scam tricks, and discuss big changes in data protection. Let these stories spark your interest and help you understand the changing…