There’s a lot to look at, watch, and listen to on the web. Fully utilizing the bookmarks feature in Google Chrome can be a real help in staying on top of everything.
Technology
1.7 billion passwords leaked on dark web and why yours is at risk

Cybercriminals aren’t just going after big targets anymore.
They’re going after everyone, and they’re doing it with infostealer malware. These small, sneaky programs are quietly stealing passwords, browser data and login tokens from everyday devices.
A new report shows just how out of control the problem has become, with infostealer activity jumping 500% in just one year, harvesting more than 1.7 billion fresh credentials.
Join the FREE “CyberGuy Report”: Get my expert tech tips, critical security alerts and exclusive deals, plus instant access to my free “Ultimate Scam Survival Guide” when you sign up!
A hacker at work (Kurt “CyberGuy” Knutsson)
The industrialization of credential theft
In 2024, cybersecurity researchers at Fortinet observed a staggering surge in stolen login data being traded on the dark web. Over 1.7 billion credentials were harvested not from old breaches but through active infections on users’ devices.
At the heart of this epidemic is a class of malware called infostealers, which are programs designed specifically to extract sensitive information like usernames, passwords, browser cookies, email logins, crypto wallets and session tokens. Unlike large-scale data breaches that target centralized databases, infostealers operate on individual machines. They don’t break into a company’s servers; they compromise the end user, often without the victim ever noticing.
These logs are then aggregated and sold by initial access brokers, intermediaries who sell compromised credentials and access tokens to other cybercriminal groups, including ransomware operators. The market has matured to the point where access to a corporate VPN, an admin dashboard or even a personal bank account can be purchased at scale, with verified functionality and region-specific pricing.
Fortinet’s 2025 Global Threat Landscape Report identified a 500% increase in credential logs from infostealer infections over the past year. Among the most widespread and dangerous infostealers identified in the report are RedLine, Vidar and Raccoon.

A hacker at work (Kurt “CyberGuy” Knutsson)
200 MILLION SOCIAL MEDIA RECORDS LEAKED IN MAJOR X DATA BREACH
How infostealers work
Infostealers are typically distributed through phishing emails, malicious browser extensions, fake software installers or cracked applications. Once installed on a device, they scan browser databases, autofill records, saved passwords and local files for any credential-related data. Many also look for digital wallets, FTP credentials and cloud service logins.
Crucially, many infostealers also exfiltrate session tokens and authentication cookies, meaning that even users who rely on multifactor authentication are not entirely safe. With a stolen session token, an attacker can bypass multifactor authentication entirely and assume control of the session without ever needing to log in manually.
Once collected, the data is uploaded to a command and control server. From there, it’s either used directly by attackers or bundled into logs and sold on forums. These logs can include everything from the victim’s IP address and geolocation to their browser fingerprint and full credential list, giving attackers everything they need to carry out further exploitation or impersonation.
WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

A man working on his personal and work laptops (Kurt “CyberGuy” Knutsson)
HR FIRM CONFIRMS 4M RECORDS EXPOSED IN MAJOR HACK
5 ways to stay safe from infostealer malware
With infostealer malware becoming a growing threat, protecting your data requires a mix of smart security habits and reliable tools. Here are five effective ways to keep your information safe.
1. Use a password manager: Many infostealers target saved passwords in web browsers. Instead of relying on your browser to store credentials, use a dedicated password manager. Our No. 1 pick has a built-in Data Breach Scanner that lets you check if your information has been exposed in known breaches. Get more details about my best expert-reviewed Password Managers of 2025 here.
2. Enable two-factor authentication (2FA): Even if your credentials are stolen, 2FA adds an extra layer of security by requiring a second form of verification, such as a code from an authentication app or biometric confirmation. Cybercriminals rely on stolen usernames and passwords to break into accounts, but with 2FA enabled, they cannot gain access without the additional security step. Make sure to enable 2FA on important accounts like email, banking and work-related logins.
3. Use strong antivirus software and be cautious with downloads and links: Infostealer malware often spreads through malicious downloads, phishing emails and fake websites. Avoid downloading software or files from untrusted sources and always double-check links before clicking them. Attackers disguise malware as legitimate software, game cheats or cracked applications, so it is best to stick to official websites and app stores for downloads.
The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks of the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.
4. Keep software updated: Cybercriminals exploit outdated software to deliver malware. Keeping your operating system, browsers and security software up to date ensures that known vulnerabilities are patched. Enable automatic updates whenever possible and install reputable antivirus or endpoint protection software that can detect and block infostealer threats before they compromise your system.
5. Consider a personal data removal service: These services can help remove your personal information from data broker sites, reducing your risk of identity theft, spam and targeted scams. While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy.
These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you. Check out my top picks for data removal services here.
HOW TO FIGHT BACK AGAINST DEBIT CARD HACKERS WHO ARE AFTER YOUR MONEY
Kurt’s key takeaway
The 1.7 billion passwords leaked in 2024 are not a relic of past breaches. They’re evidence of an evolving, industrialized cybercrime economy built on the backs of unsuspecting users and quietly infected devices. The tools are cheap, the scale is massive and the impact is personal. If you’ve ever saved a password in a browser, downloaded an unofficial app or clicked a link in a sketchy email, your credentials may already be in circulation.
Who do you think should be primarily responsible for protecting personal and organizational data from cyber threats: individual users, companies, software providers or government agencies? Why? Let us know by writing us at Cyberguy.com/Contact.
For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.
Ask Kurt a question or let us know what stories you’d like us to cover.
Follow Kurt on his social channels:
Answers to the most-asked CyberGuy questions:
New from Kurt:
Copyright 2025 CyberGuy.com. All rights reserved.

Technology
How to manage your bookmarks in Google Chrome

Chrome is the browser I use most often, and I’ve got a huge number of bookmarked sites inside it: long reads I want to get back to once work is done, news updates to write up for work, gift ideas, apps I’d like to check out, important Slack channels, and content systems for my job… the list goes on. All synced between devices and available everywhere.
If you haven’t done a deep dive into Chrome’s bookmarks feature then you might not be aware of everything you can do with it, how it can save you time, and how you can bring some kind of order to your web browsing.
The star icon to the right of the address bar in Chrome on the desktop is for saving new bookmarks. Click it and the current page gets saved to the most recently used bookmarks folder. You can also press Ctrl+D (Windows) or Cmd+D (macOS), which is even easier. On mobile, tap the three dots at the top then the star icon (Android), or the three dots at the bottom then Add to bookmarks (iOS) to save the current page as a new bookmark.
As soon as a bookmark is saved, a small dialog pops up. You can use it to change the bookmark name and folder if you need to, or just click Done to move on.
More options can be found on the desktop by clicking the three dots (top right) then Bookmarks and lists. You’re able to add bookmarks from this menu, too, and there’s also a Bookmark all tabs option, which saves every open tab (which, like tab groups, is handy if you need to do something else but want to be able to get back to where you are).
On the same Bookmarks and lists menu you can toggle the bookmarks bar on and off. The bookmarks bar sits just below the address bar, and gives you another way to add bookmarks: drag the URL of the site you’re viewing down from the address bar to the bookmarks bar.

Bookmarks become a lot more useful when they’re well organized. On the desktop you can launch the full bookmarks manager by clicking Bookmarks on the bookmarks bar, or by clicking the three dots (top right) and then Bookmarks and Lists > Bookmark Manager. You can search through your bookmarks here, and create new folders: Click the three dots (top right), then Add new folder — and yes, you can put folders inside other folders. (This is also where you’ll find the Export feature, and it’s a good idea to export your bookmarks occasionally as a backup.)
Folders are a key part of keeping your bookmarks organized, and they’re all accessible on the left of the bookmarks manager page. Click and drag bookmarks to change their order, or to move them into different folders. Right-click on a folder to rename or delete it, or drag it on top of another folder to put it inside that folder.
You can double-click any bookmark to open it. To edit it, click the three dots to the right: You’re able to rename your bookmarks and change their URLs, as well as put them in different folders. If you right-click on a bookmarks folder, you get the option to open all the links it contains in separate tabs — which may not do your computer much good if there are dozens or hundreds of bookmarks in the folder.
The bookmark manager can be accessed on mobile too, though you don’t get quite as many options to play around with. Tap the three dots at the top (Android) or bottom (iOS) of the interface, then choose Bookmarks to see the list. As long as you’re signed in with your Google account, bookmarks will sync between your devices.
Doing more with bookmarks

There are other ways to work with your bookmarks in Chrome.
- Here’s a clever trick for your desktop bookmarks bar: right-click on each bookmark in turn, remove the text in the Name field completely each time, and click Save. You’ll then have a compact row of bookmark icons showing only the favicons for each site (such as a purple V for The Verge). It’s a neat way to put more bookmarks within each reach, and you can still tell what each one is.
- Something else you might want to try is to search through your bookmarks directly from the address bar. You may see some bookmark results suggested underneath as you type out your search query, and you can also force a bookmarks search by preceding your query with “@bookmarks” and a space.
- If you want to keep bookmarks visible at all times, that’s possible too. Click the three dots in Chrome for the desktop, then choose Bookmarks and lists > Show all bookmarks. A side panel appears displaying all your bookmarks: You can search through them, create new folders, and edit your bookmarks from here (click the three dots to the side).
- The icons in the top right corner, from left to right, let you change the order of the bookmark lists, switch between compact and visual views, and edit multiple bookmarks at once. You can shut down the panel with the X button, but if you click the pin button just next to it before you do, you get a dedicated bookmarks panel icon that stays permanently available on the Chrome toolbar, and will let you open it back up again.
This has hopefully given you some idea of what you can do with bookmarks in Google Chrome. And there’s more, so it might be worth it to take some time and look around. It’s not the most sophisticated of systems, but it does give you plenty of flexibility in terms of how you can use it and what’s possible, so you can get your folders and shortcuts set up in the ways that work best for you.
Technology
Space capsule marks milestone for bringing cargo back from orbit

While the United States has long been a leader in space exploration and commercial launches, Europe is now making significant strides of its own. Recently, a major milestone was achieved when Atmos Space Cargo, a European startup, successfully completed the first orbital test flight of its Phoenix 1 re-entry space capsule.
This mission, which launched from Cape Canaveral, Florida, as part of a SpaceX Falcon 9 rideshare, marks a new chapter in global space logistics.
By demonstrating that Europe can develop and operate advanced return technology, Atmos is helping to make space more accessible and efficient for researchers, businesses and innovators on both sides of the Atlantic.
This achievement signals the arrival of a new player in the space return market and opens the door to greater collaboration and competition in the rapidly growing field of commercial space logistics.
JOIN THE FREE CYBERGUY REPORT: GET MY EXPERT TECH TIPS, CRITICAL SECURITY ALERTS AND EXCLUSIVE DEALS — PLUS INSTANT ACCESS TO MY FREE ULTIMATE SCAM SURVIVAL GUIDE WHEN YOU SIGN UP!
Phoenix 1 (Atmos Space Cargo)
The mission: From launch to splashdown
Phoenix 1 launched aboard a SpaceX Falcon 9 rocket from Cape Canaveral, Florida, as part of the Bandwagon-3 rideshare mission. After reaching a 45-degree inclination orbit, the capsule completed one full trip around Earth. A carefully timed de-orbit maneuver then sent Phoenix 1 back toward the planet. During its descent, the capsule deployed an innovative inflatable heat shield, a technology designed by Atmos to protect the capsule during the intense heat and friction of reentry.
FIRST PRIVATE SPACEX POLAR MISSION SPLASHES DOWN NEAR CALIFORNIA
As Phoenix 1 reentered Earth’s atmosphere, it transmitted critical system and payload data to ground stations in South America. The capsule splashed down in the Atlantic Ocean, about 1,240 miles off the Brazilian coast. Because of the remote landing location, recovery of the capsule was not planned. However, the mission’s main objectives were met, and the data collected is now being analyzed to inform future missions.

Phoenix 1 (Atmos Space Cargo)
329,000 MPH NUCLEAR ROCKET LEADING THE NEXT ERA OF SPACE TRAVEL
Why Phoenix 1 is a big milestone
The success of Phoenix 1 establishes Atmos as the fastest-moving private space logistics company in Europe to conduct an orbital return mission. This achievement demonstrates that Europe is on the path to developing independent, sovereign return capabilities.
It also shows that private industry can lead the way in building essential space infrastructure. Atmos’ rapid prototyping approach allowed the team to develop, qualify and fly Phoenix 1 in less than a year. This speed is almost unheard of in the space industry and highlights the company’s commitment to innovation and hands-on problem-solving. The mission also proved that multinational collaboration is possible, as teams from around Europe worked together to achieve a common goal.
WHAT HACKERS CAN LEARN ABOUT YOU FROM A DATA BROKER FILE

Phoenix 1 (Atmos Space Cargo)
AMAZON TAKES ON ELON MUSK LAUNCHING 27 INTERNET SATELLITES
What was learned and tested
The Phoenix 1 mission had several core objectives. The team aimed to collect in-flight data from the capsule and its subsystems while in orbit. The mission also carried scientific and commercial payloads, including technology demonstrators and biological experiments from partners such as Frontier Space, Imperial College London, DLR and IDDK.
Another key goal was to deploy and test the inflatable heat shield under real reentry conditions. Although some data from the final stage of descent could not be retrieved due to the splashdown location, the mission still provided valuable insights. The data received from the capsule has already contributed to the development of Phoenix 2, the next-generation capsule planned for launch in 2026.
SPACEX LAUNCH SCRUBBED HOURS AFTER HEGSETH SHARES MESSAGE TO RESCUE MISSION CREW: ‘WISH YOU GODSPEED’

Phoenix 1 (Atmos Space Cargo)
NASA’S MARTIAN HELICOPTER PROMISES UNPRECEDENTED VIEWS OF THE RED PLANET
The technology: Inflatable heat shield and rapid prototyping
The inflatable heat shield is a breakthrough in reentry technology. Traditional capsules rely on heavy, single-use heat shields or parachutes to survive reentry. Atmos’ design is lighter, more efficient and potentially reusable, which could dramatically reduce the cost and complexity of returning cargo from space.
Atmos’ development philosophy is based on rapid prototyping and real-world testing. The team believes in building and testing hardware quickly, learning from each iteration and making improvements based on real data rather than relying solely on simulations. This approach allowed Phoenix 1 to go from concept to space in record time.

Phoenix 1 (Atmos Space Cargo)
The road ahead
Atmos is already working on Phoenix 2, which will include its own propulsion system. This upgrade will allow the capsule to control its reentry trajectory and choose its splashdown zone, making recovery much easier and more practical. The company’s vision is to create a flexible, cost-efficient and reliable logistics platform for space, supporting both commercial and institutional missions.
With a payload efficiency of 1:2, Phoenix already offers the highest mass efficiency on the market. This opens new opportunities for microgravity research, in-space manufacturing and biotechnology. The technology will also support Europe’s defense sector and strengthen the continent’s independent space infrastructure.

Phoenix 1 (Atmos Space Cargo)
What this means for you
The success of Phoenix 1 is not just a technical achievement for engineers and scientists. It has the potential to assist with many aspects of everyday life. Faster and more affordable access to space means that new technologies, medicines and materials can be developed and tested in microgravity and then brought back to Earth for use.
Universities, startups and small companies will have more opportunities to conduct experiments in space without the high costs and long wait times that have been barriers in the past. Atmos Space Cargo’s growing space capabilities could also lead to new jobs, investment and technological leadership.
SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

Phoenix 1 (Atmos Space Cargo)
Kurt’s key takeaways
Phoenix 1’s successful mission is a sign that space is becoming more accessible and that innovation is happening at an unprecedented pace. By proving that rapid development and new ideas can work in the challenging environment of space, Atmos Space Cargo is paving the way for a future where space logistics are as routine as shipping goods across continents. The next generation of breakthroughs in science and technology may very well start their journey with a ride on a capsule like Phoenix.
Do you think the United States should accelerate its own space return technology to stay ahead, or is international competition good for innovation? Let us know by writing us at Cyberguy.com/Contact
For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter
Ask Kurt a question or let us know what stories you’d like us to cover
Follow Kurt on his social channels
Answers to the most asked CyberGuy questions:
New from Kurt:
Copyright 2025 CyberGuy.com. All rights reserved.
Technology
Apple is trying to get ‘LLM Siri’ back on track

Apple Intelligence has been a wreck since its first features rolled out last year, and a big new report from Bloomberg’s Mark Gurman details why — and how Apple is trying to piece things back together. And much of its effort hinges on rebuilding Siri from the ground up.
Gurman has reported in the past that Apple is working on what it’s internally calling ‘LLM Siri’ — a reworked, generative AI version of the company’s digital assistant. Apple’s previous approach of merging the assistant with the existing Siri hasn’t been working. Gurman describes in great detail a number of reasons why, but here’s a quick summary:
Now the company is trying to rejigger its approach. Part of that is a total overhaul of Siri, rather than just trying to make generative AI work in concert with the old Siri. According to Gurman, Apple has its AI team in Zurich working on a new architecture that will “entirely build on an LLM-based engine.” Gurman reported in November last year that the company was working on this, and the idea is that it will make the assistant “more believably conversational and better at synthesizing information.”
Another part of the solution is leveraging iPhones and differential privacy to improve Apple’s synthesized data — comparing fake training data with language from iPhone users’ emails, but doing so on-device and sending only the synthesized data back to Apple for AI training. And one way the company is discussing improving Siri is letting the LLM version loose on the web to “grab and synthesize data from multiple sources.” Basically, Siri as an AI web search tool not unlike Perplexity, which is one of the companies Apple has approached about partnering for AI search in Safari.
Whatever the outcome, apparently Giannandrea won’t be a direct part of it, having been taken off of product development, Siri, and robotics projects in the spring. According to Gurman, Apple execs have talked about putting him “on a path to retirement,” but are concerned that some of the research and engineering folks he brought with him would leave with him, too. Whatever the case, Gurman says Giannandrea plans to stick around, “relieved Siri is now someone else’s problem.”
-
Austin, TX1 week ago
Best Austin Salads – 15 Food Places For Good Greens!
-
Technology1 week ago
Mexico is suing Google over how it’s labeling the Gulf of Mexico
-
Politics1 week ago
DHS says Massachusetts city council member 'incited chaos' as ICE arrested 'violent criminal alien'
-
Politics1 week ago
President Trump takes on 'Big Pharma' by signing executive order to lower drug prices
-
Business1 week ago
In-N-Out Burger adds three new California locations to list of 2025 openings
-
News6 days ago
As Harvard Battles Trump, Its President Will Take a 25% Pay Cut
-
Education1 week ago
A Professor’s Final Gift to Her Students: Her Life Savings
-
News1 week ago
Why Trump Suddenly Declared Victory Over the Houthi Militia