thumbnail Update: Kering confirms Gucci and other brands hacked; claims no conversations with hackers?
thumbnail China’s ‘Typhoons’ changing the way FBI hunts sophisticated threats
thumbnail Lovesac confirms data breach after ransomware attack claims
thumbnail ‘Partygate,’ a Russian threat and reality TV: What hackers found in Boris Johnson leak
thumbnail Jeremy Clarkson revealed hackers stole £27,000 from his pub
thumbnail Major blood center says thousands had data leaked in January ransomware attack
thumbnail European crypto platform SwissBorg to reimburse users after $41 million theft
thumbnail SessionReaper, unauthenticated RCE in Magento & Adobe Commerce (CVE-2025-54236)
thumbnail SAP fixes maximum severity NetWeaver command execution flaw
thumbnail ICE reactivates contract with spyware maker Paragon
thumbnail SaaS giant Workiva discloses data breach after Salesforce attack
thumbnail Tech war: Huawei executive claims victory over US sanctions with computing, AI ecosystem
thumbnail Le site de la CGN a été victime d'une cyberattaque
thumbnail A Primer on Forensic Investigation of Salesforce Security Incidents
thumbnail Jaguar Land Rover production severely hit by cyber attack
thumbnail Zscaler, Palo Alto Networks, SpyCloud among the affected by Salesloft Drift breach - Help Net Security
thumbnail Hexstrike-AI: LLM Orchestration Driving Real-World Zero-Day Exploits
thumbnail TikTok Shop propose un simili AirTag pour espionner vos proches...
thumbnail Cloudflare hit by data breach in Salesloft Drift supply chain attack
thumbnail Spanish government cancels €10m contract using Huawei equipment
thumbnail U.S. Government Seizes Online Marketplaces Selling Fraudulent Identity Documents Used in Cybercrime Schemes
thumbnail Salesloft Drift Supply Chain Incident: Key Details and Zscaler’s
thumbnail OpenAI Says It's Scanning Users' ChatGPT Conversations and Reporting Content to the Police
thumbnail Amazon disrupts watering hole campaign by Russia’s APT29
thumbnail UK and allies expose China-based technology companies for enabling global cyber campaign against critical networks
thumbnail State-Sponsored Hackers Behind Majority of Vulnerability Exploits - Infosecurity Magazine
thumbnail Chinese hack group targets Dutch internet providers, intelligence agencies confirm | NL Times
thumbnail Root - CVE-2025-48384: Critical Git Vulnerability Actively Exploited
thumbnail WhatsApp fixes 'zero-click' bug used to hack Apple users with spyware | TechCrunch
thumbnail Velociraptor incident response tool abused for remote access
thumbnail Je suis une entreprise suisse. Suis-je concernée par NIS2?
thumbnail Hundreds of Swedish municipalities impacted by suspected ransomware attack on IT supplier
thumbnail Thousands of Developer Credentials Stolen in macOS “s1ngularity” Attack
thumbnail Swiss hospitals join forces against cyber-attacks - SWI swissinfo.ch
thumbnail Euro banks block 'unauthorized' PayPal direct debits
thumbnail Agentic Browser Security: Indirect Prompt Injection in Perplexity Comet
thumbnail Android Developers Blog: A new layer of security for certified Android devices
thumbnail Microsoft Asked FBI for Help Tracking Palestinian Protests
thumbnail Farmers Insurance data breach impacts 1.1M people after Salesforce attack
thumbnail Intel and Trump Administration Reach Historic Agreement to Accelerate American Technology and Manufacturing Leadership
thumbnail Limiting Onmicrosoft Domain Usage for Sending Emails
thumbnail CyberAttaque Auchan : quand la fidélité devient vulnérable
thumbnail Uzbekistan airline hack reveals data on U.S. government employees
thumbnail Attackers claim they hacked Nissan's design studio and stole 4TB of data
thumbnail Inside the Lab-Dookhtegan Hack: How Iranian Ships Lost Their Voice at Sea
thumbnail Tech war: Huawei unveils algorithm that could cut China’s reliance on foreign memory chips
thumbnail Developer jailed for malware that took out his employer
thumbnail Intel Outside: Hacking every Intel employee and various internal websites
thumbnail Serial hacker who defaced official websites is sentenced
thumbnail Threat Actor Claims to Sell 15.8 Million Plain-Text PayPal Credentials
thumbnail Hackers who exposed North Korean government hacker explain why they did it | TechCrunch
thumbnail African authorities dismantle massive cybercrime and fraud networks, recover millions
thumbnail Speed cameras knocked out after cyber attack
thumbnail Microsoft cuts off China's early access to bug disclosures
thumbnail Think before you Click(Fix): Analyzing the ClickFix social engineering technique | Microsoft Security Blog
thumbnail Apple fixes zero-day vulnerability exploited in "extremely sophisticated attack" (CVE-2025-43300)
thumbnail Elon Musk’s xAI Published Hundreds Of Thousands Of Grok Chatbot Conversations
thumbnail When Safe Links Become Unsafe: How Raven AI Caught Attackers Weaponizing Cisco's URL Rewriting | RavenMail
thumbnail Preventing Domain Resurrection Attacks
thumbnail NIST Guidelines Can Help Organizations Detect Face Photo Morphs, Deter Identity Fraud
thumbnail Huawei's reach in Spain sparks widespread concern over state infiltration
thumbnail How We Exploited CodeRabbit: From a Simple PR to RCE and Write Access on 1M Repositories
thumbnail Dissecting PipeMagic: Inside the architecture of a modular backdoor framework
thumbnail Grok Exposes Underlying Prompts for Its AI Personas: ‘EVEN PUTTING THINGS IN YOUR ASS’
thumbnail Alltricks piraté : de faux mails avec de vrais pièges envoyés aux clients
thumbnail « C'est une attaque vraiment massive », pourquoi le Muséum national d'histoire naturelle de Paris est-il la cible de cybercriminels ?
thumbnail Cyber Invasion: 300 auto recyclers victims in ransomware attack
thumbnail AT&T may pay customers up to $7,500 in $177 million data breach settlement
thumbnail HMRC staff spying on taxpayers and accessing records without permission
thumbnail When LLMs autonomously attack
thumbnail Buttercup is now open-source!
thumbnail Exclusive: US embeds trackers in AI chip shipments to catch diversions to China, sources say
thumbnail Hackers Breach Canadian Government Via Microsoft Exploit
thumbnail In vendita documenti di identità trafugati da hotel italiani –
thumbnail Russian hackers took control of Norwegian dam, police chief says
thumbnail Hackers leak Allianz Life data stolen in Salesforce attacks
thumbnail MuddyWater’s DarkBit ransomware cracked for free data recovery
thumbnail Security flaws in a carmaker's web portal let one hacker remotely unlock cars from anywhere
thumbnail Dutch Prosecutors Recover From Suspected Russian Hack
thumbnail Google discovered a new scam—and also fell victim to it
thumbnail Germany’s top court holds that police can only use spyware to investigate serious crimes
thumbnail Insurance won't cover $5M in City of Hamilton claims for cyberattack, citing lack of log-in security
thumbnail Pandora victime d’une cyberattaque… « seules des données courantes ont été copiées »
thumbnail Cyberattaque contre Bouygues Telecom : 6,4 millions de clients impactés, des IBAN dérobés - Next
thumbnail Millions of cars at risk from Flipper Zero key fob hack, experts warn
thumbnail Microsoft warns of high-severity flaw in hybrid Exchange deployments
thumbnail KLM, Air France latest major orgs to have data looted
thumbnail SharePoint Exploit: Microsoft Used China-Based Engineers to Maintain the Software
thumbnail Hospital fined after patient files used as snack bags
thumbnail Exclusive: Confidential informants exposed in Louisiana sheriff's office hack
thumbnail Breaking NVIDIA Triton: CVE-2025-23319 - A Vulnerability Chain Leading to AI Server Takeover
thumbnail SonicWall urges customers to take VPN devices offline after ransomware incidents
thumbnail Google says its AI-based bug hunter found 20 security vulnerabilities
thumbnail Arnaque au faux SMS: 220 victimes et 3,6 millions de francs de pertes - 20 minutes
thumbnail OpenAI removes ChatGPT feature after private conversations leak to Google search
thumbnail Leading phone repair and insurance firm collapses after paying crippling ransomware demand — Cutting 100+ employees to just eight wasn’t enough
thumbnail Ransomware attacks cripple government services across Dutch Caribbean islands | NL Times
thumbnail Patents by Silk Typhoon-linked company shed light on Beijing’s offensive hacking capabilities
thumbnail PyPI Users Email Phishing Attack
thumbnail More than 90 state, local governments targeted using Microsoft SharePoint vulnerability, group says
thumbnail Naming country linked to UNC3886 attack not in Singapore’s best interest at this point in time: Shanmugam
thumbnail Luxembourg probes reported attack on Huawei tech that caused nationwide telecoms outage | The Record from Recorded Future News
thumbnail AI slop and fake reports are coming for your bug bounty programs
thumbnail Frozen in transit: Secret Blizzard’s AiTM campaign against diplomats
thumbnail Swiss army funds sovereign satellite network scheme
thumbnail An important update (and apology) on our PoisonSeed blog
thumbnail Ukrainian intelligence crashes Russian occupation servers in Crimea
thumbnail Google took a month to shut down Catwatchful, a phone spyware operation hosted on its servers
thumbnail « Il reste 24 heures à Naval Group pour me contacter », un hacker menace le géant français de la construction militaire
thumbnail Tea app hacked: 13,000 photos leaked after 4chan call to action
thumbnail Pro-Ukrainian hackers claim massive cyberattack on Russia's Aeroflot
thumbnail Arizona woman sentenced to 8.5 years for running North Korean laptop farm
thumbnail Hacker Plants Computer 'Wiping' Commands in Amazon's AI Coding Agent
thumbnail Amazon AI coding agent hacked to inject data wiping commands
thumbnail Blame a leak for Microsoft SharePoint attacks: researcher
thumbnail Renting Android Malware Is Getting Easier and Cheaper
thumbnail China rolls out ‘voluntary’ cyber ID system amid concerns over privacy, censorship | South China Morning Post
thumbnail Clorox accuses IT provider in lawsuit of giving hackers employee passwords | Reuters
thumbnail Aptly Named: How the Leakzone Exposed Access Logs
thumbnail Microsoft exec admits it 'cannot guarantee' data sovereignty
thumbnail BlackSuit ransomware leak sites seized in Operation Checkmate
thumbnail Disrupting active exploitation of on-premises SharePoint vulnerabilities | Microsoft Security Blog
thumbnail Inside DDoSia: NoName057(16)’s Pro-Russian DDoS Campaign Infrastructure
thumbnail Weak password allowed hackers to sink a 158-year-old company
thumbnail Le cerveau du géant cybercriminel XXS.is arrêté à Kiev, après quatre ans d'enquête française
thumbnail npm 'accidentally' removes Stylus package, breaks builds and pipelines
thumbnail Un incident cyber expose les données de 340 000 usagers France Travail
thumbnail Lumma infostealer malware returns after law enforcement disruption
thumbnail Microsoft knew of SharePoint security flaw but failed to effectively patch it, timeline shows
thumbnail Wartime cyberattack wiped data from two major Iranian banks, expert says | Iran International
thumbnail Russian vodka producer reports disruptions after ransomware attack | The Record from Recorded Future News
thumbnail A Startup is Selling Data Hacked from Peoples’ Computers to Debt Collectors
thumbnail Dior begins sending data breach notifications to U.S. customers
thumbnail How China’s Patriotic ‘Honkers’ Became the Nation’s Elite Cyberspies
thumbnail Lookout Discovers Massistant Chinese Mobile Forensic Tooling
thumbnail Microsoft Confirms Ongoing Mass SharePoint Attack — No Patch Available
thumbnail Les données de 126 000 à 530 000 patients d’un hôpital privé de Saint-Étienne dérobées
thumbnail Air Serbia delays staff payslips due to ongoing cyberattack
thumbnail Seychelles Commercial Bank Confirms Customer Data Breach
thumbnail Ransomware attack disrupts Korea's largest guarantee insurer - The Korea Herald
thumbnail Remote Input Injection vulnerability in Air Keyboard iOS App Still Unpatched
thumbnail Global operation targets NoName057(16) pro-Russian cybercrime network – The offenders targeted Ukraine and supporting countries, including many EU Member States
thumbnail US National Guard unit was 'extensively' hacked by Salt Typhoon in 2024, memo says
thumbnail Grok 4 Without Guardrails? Total Safety Failure. We Tested and Fixed Elon’s New Model.
thumbnail Thousands of Afghans relocated to UK under secret scheme after data leak
thumbnail Microsoft “Digital Escorts” Could Expose Defense Dept. Data to Chinese Hackers — ProPublica
thumbnail Chinese chipmaker Sophgo adapts compute card for DeepSeek in Beijing’s self-reliance push | South China Morning Post
thumbnail Bitcoin Depot breach exposes data of nearly 27,000 crypto users
thumbnail Critical-Vulnerabilities-in-Network Detective
thumbnail France launches criminal investigation into Musk’s X over algorithm manipulation
thumbnail When Backups Open Backdoors: Accessing Sensitive Cloud Data via "Synology Active Backup for Microsoft 365" / modzero
thumbnail Cyber crooks jump on .es domain for credential phishing trip •
thumbnail Data Leaks from the Chinese Hacking-for-Hire Industry
thumbnail Four arrested by UK police over ransomware attacks on M&S, Co-op and Harrods
thumbnail Data Brokers are Selling Your Flight Information to CBP and ICE
thumbnail New “Opossum” Attack Breaches Secure TLS by Injecting Malicious Messages
thumbnail French intel chief warns of evolving Russian hybrid operations, ‘existential threat’ to Europe | The Record from Recorded Future News
thumbnail Canadian media giant Rogers named as victim of Chinese telecom hackers - Nextgov/FCW
thumbnail Would you like an IDOR with that? Leaking 64 million McDonald’s job applications
thumbnail 11 Google-Verified Chrome Extensions Infected Over 1.7 Million Users
thumbnail Enterprise Software Extension Security & Management Platform
thumbnail Critical Vulnerabilities in KIA Infotainment Let Attackers Inject Code with PNG Files
thumbnail New Hpingbot Exploits Pastebin for Payload Delivery and Uses Hping3 for DDoS Attacks
thumbnail Malvertising Campaign Delivers Oyster/Broomstick Backdoor via SEO Poisoning and Trojanized Tools
thumbnail Atomic macOS infostealer adds backdoor for persistent attacks
thumbnail Venture capital giant IdeaLab confirms breach, says private data was stolen in attack
thumbnail SEC and SolarWinds Seek Settlement in Securities Fraud Case
thumbnail Ingram Micro outage caused by SafePay ransomware attack
thumbnail Netflix, Apple, BofA sites hijacked with fake help numbers
thumbnail Hacktivists' Claimed Breach of Nuclear Secrets Debunked
thumbnail Johnson Controls starts notifying people affected by 2023 breach
thumbnail Ransomware gang attacks German charity that feeds starving children
thumbnail Data breach reveals Catwatchful 'stalkerware' is spying on thousands of phones
thumbnail Cyberattack on Brazil tech provider affects reserve accounts of some financial institutions
thumbnail A Group of Young Cybercriminals Poses the ‘Most Imminent Threat’ of Cyberattacks Right Now
thumbnail NimDoor crypto-theft macOS malware revives itself when killed
thumbnail Cisco warns that Unified CM has hardcoded root SSH credentials
thumbnail NetScaler Critical Security Updates for CVE-2025-6543 and CVE-2025-5777
thumbnail FBI Warning on IoT Devices: How to Tell If You Are Impacted
thumbnail Iran-linked hackers threaten to release Trump aides' emails
thumbnail Treasury Sanctions Global Bulletproof Hosting Service Enabling Cybercriminals and Technology Theft
thumbnail Chrome 0-Day Flaw Exploited in the Wild to Execute Arbitrary Code
thumbnail The People's Liberation Army Cyberspace Force
thumbnail Unveiling RIFT: Enhancing Rust malware analysis through pattern matching
thumbnail Dozens of pro-Indy accounts go dark after Israeli strikes
thumbnail Hacker helped kill FBI sources, witnesses in El Chapo case, according to watchdog report
thumbnail Norwegian Dam Valve Forced Open for Hours in Cyberattack
thumbnail Hide Your RDP: Password Spray Leads to RansomHub Deployment
thumbnail DeepSeek faces ban from Apple, Google app stores in Germany | Reuters
thumbnail Denmark to tackle deepfakes by giving people copyright to their own features
thumbnail Hawaiian Airlines discloses cyberattack, flights not affected
thumbnail Pre-Auth Flaw in MongoDB Server Allows Attackers to Cause DoS
thumbnail Scale AI exposed sensitive data about clients like Meta and xAI in public Google Docs, BI finds
thumbnail Microsoft 365 'Direct Send' abused to send phishing as internal users
thumbnail CISA: AMI MegaRAC bug enabling server hijacks exploited in attacks
thumbnail Piratage Adecco : le procès XXL de Lyon jugera le siphonnage de 76 000 fiches d’intérimaires
thumbnail Crash (exploit) and burn: Securing the offensive cyber supply chain to counter China in cyberspace
thumbnail Surge in MOVEit Transfer Scanning Activity Could Signal Emerging Threat Activity
thumbnail 16% of Swiss federal politicians have data on dark web
thumbnail NATO summit commences in tandem with tense cyber, kinetic…
thumbnail Hacktivists Launch DDoS Attacks at U.S. Following Iran Bombings
thumbnail Echo Chamber: A Context-Poisoning Jailbreak That Bypasses LLM Guardrails
thumbnail Exclusive: DeepSeek aids China's military and evaded export controls, US official says
thumbnail UK watchdog fines 23andMe over 2023 data breach
thumbnail UBS Employee Data Reportedly Exposed in Third Party Attack
thumbnail No, the 16 billion credentials leak is not a new data breach
thumbnail CoinMarketCap Briefly Exploited With Wallet Phishing Pop-Up Message
thumbnail ‘States don’t do hacking for fun’: NCSC expert urges businesses to follow geopolitics as defensive strategy
thumbnail CVE-2025-49763 - Remote DoS via Memory Exhaustion in Apache Traffic Server via ESI Plugin
thumbnail Record DDoS pummels site with once-unimaginable 7.3Tbps of junk traffic
thumbnail Iran's government says it shut down internet to protect against cyberattacks
thumbnail La commune de Villars-sur-Glâne subit une cyberattaque
thumbnail Health ministry’s information system hit by ransomware attack – TALANOA 'O TONGA
thumbnail India's TCS says none of its systems were compromised in M&S hack | Reuters
thumbnail 130,000 UBS employees affected: Hackers publish Ermotti's phone number on the darknet
thumbnail Kremlin-affiliated outlets find digital ally in Colombia's oldest guerrilla group
thumbnail GreyNoise Observes Exploit Attempts Targeting Zyxel CVE-2023-28771
thumbnail 10K Records Allegedly from Mac Cloud Provider’s Customers Exposed Online
thumbnail Pro-Israel hacktivist group claims responsibility for alleged Iranian bank hack
thumbnail New permission prompt for Local Network Access
thumbnail KB4743: Vulnerabilities Resolved in Veeam Backup & Replication 12.3.2
thumbnail A Wretch Client: From ClickFix deception to information stealer deployment — Elastic Security Labs
thumbnail Police seizes Archetyp Market drug marketplace, arrests admin
thumbnail Coming to Apple OSes: A seamless, secure way to import and export passkeys
thumbnail Hackers take aim at Washington Post journalists in an apparent ‘targeted’ cyberattack | CNN Business
thumbnail World Leaks: An Extortion Platform
thumbnail Over 46,000 Grafana instances exposed to account takeover bug
thumbnail Sweden under cyberattack: Prime minister sounds the alarm - Euractiv
thumbnail Predator Spyware Resurgence: Insikt Group Exposes New Global Infrastructure
thumbnail Graphite Caught: First Forensic Confirmation of Paragon’s iOS Mercenary Spyware Finds Journalists Targeted
thumbnail Apple fixes new iPhone zero-day bug used in Paragon spyware hacks
thumbnail Éducation nationale : Stormous semble avoir constitué une « combolist » |
thumbnail Modification de la norme FIDO2: renforcer la sécurité numérique pour les banques suisses et leurs clients
thumbnail That DeepSeek installer you just clicked? It's malware
thumbnail Hackers exploited Windows WebDav zero-day to drop malware
thumbnail Echoleak Blogpost
thumbnail Down the Rabbit Hole of Unicode Obfuscation
thumbnail 20,000 malicious IPs and domains taken down in INTERPOL infostealer crackdown
thumbnail Microsoft Outlook to block more risky attachments used in attacks
thumbnail Telegram, the FSB, and the Man in the Middle
thumbnail Follow the Smoke | China-nexus Threat Actors Hammer At the Doors of Top Tier Targets
thumbnail Splunk Universal Forwarder on Windows Lets Non-Admin Users Access All Contents
thumbnail iVerify Uncovers Evidence of Zero-Click Mobile Exploitation in the U.S.
thumbnail EU launches EU-based, privacy-focused DNS resolution service
thumbnail Major food wholesaler says cyberattack impacting distribution systems
thumbnail The Cost of a Call: From Voice Phishing to Data Extortion
thumbnail Hackers Leak 86 Million AT&T Records with Decrypted SSNs
thumbnail Hacker selling critical Roundcube webmail exploit as tech info disclosed
thumbnail Cisco warns of ISE and CCP flaws with public exploit code
thumbnail International operation results in arrest of 22 men in Nigeria for sextortion | Australian Federal Police
thumbnail Malaysian home minister’s WhatsApp hacked, used to scam contacts
thumbnail Vanta bug exposed customers' data to other customers | TechCrunch
thumbnail Sac à dos Decathlon à 2 francs: ce que l'on sait sur l'arnaque
thumbnail Announcing a new strategic collaboration to bring clarity to threat actor naming | Microsoft Security Blog
thumbnail 50,000+ Azure AD Users Exposed via Unsecured API: BeVigil Uncovers Critical Flaw | CloudSEK
thumbnail Official Root Cause Analysis (RCA) for SentinelOne Global Service Interruption
thumbnail Hidden Bear: The GRU hackers of Russia’s most notorious kill squad
thumbnail Google Online Security Blog: Sustaining Digital Certificate Security - Upcoming Changes to the Chrome Root Store
thumbnail Lumma Infostealer – Down but Not Out?
thumbnail The hottest new vibe coding startup Lovable is a sitting duck for hackers
thumbnail Dero miner spreads inside containerized Linux environments | Securelist
thumbnail Czech Republic says China behind cyberattack on ministry, embassy rejects accusations | Reuters
thumbnail New Russia-affiliated actor Void Blizzard targets critical sectors for espionage
thumbnail Victoria's Secret hit by outages as it battles security incident | TechCrunch
thumbnail Tracking AyySSHush: a Newly Discovered ASUS Router Botnet Campaign
thumbnail Lyrix Ransomware
thumbnail UK to deliver pioneering battlefield system and bolster cyber warfare capabilities under Strategic Defence Review
thumbnail Update on May 29 Outage
thumbnail ConnectWise Confirms ScreenConnect Cyberattack, Says Systems Now Secure: Exclusive
thumbnail La faille zero day Commvault ouvre la voie à une cascade d'exploits
thumbnail DragonForce actors target SimpleHelp vulnerabilities to attack MSP, customers – Sophos News
thumbnail Estonia launches international search for Moroccan citizen wanted over data theft
thumbnail AyySSHush: Tradecraft of an emergent ASUS botnet
thumbnail DragonForce ransomware abuses SimpleHelp in MSP supply chain attack
thumbnail Exclusive: Tiffany confirms data breach in South Korea following Dior incident
thumbnail ModSecurity Vulnerability Exposes Millions of Web Servers to Severe DoS Condition
thumbnail Threat of TCC Bypasses on macOS
thumbnail Fake Zenmap. WinMRT sites target IT staff with Bumblebee malware
thumbnail SVGs: the hacker’s canvas
thumbnail SVG Phishing Malware Being Distributed with Analysis Obstruction Feature
thumbnail How I used o3 to find CVE-2025-37899, a remote zeroday vulnerability in the Linux kernel’s SMB implementation
thumbnail Arla Foods confirms cyberattack disrupts production, causes delays
thumbnail Microsoft’s AI security chief accidentally reveals Walmart’s AI plans after protest
thumbnail 184 millions de mots de passe uniques exposés publiquement : l’énorme fuite que personne n’a vue venir
thumbnail Le site de l'Etat du Valais victime d'une cyberattaque
thumbnail TikTok Videos Promise Pirated Apps, Deliver Vidar and StealC Infostealers Instead
thumbnail Europol and Microsoft disrupt world’s largest infostealer Lumma
thumbnail Unpatched critical bugs in Versa Concerto lead to auth bypass, RCE
thumbnail Unit 42 Develops Agentic AI Attack Framework
thumbnail How Adversary Telegram Bots Help to Reveal Threats: Case Study  - ANY.RUN's Cybersecurity Blog
thumbnail Plusieurs comptes SwissPass piratés en Suisse romande
thumbnail Another Confluence Bites the Dust: Falling to ELPACO-team Ransomware
thumbnail How the Signal Knockoff App TeleMessage Got Hacked in 20 Minutes
thumbnail You're Invited: Delivering malware via Google Calendar invites and PUAs
thumbnail Twilio denies breach following leak of alleged Steam 2FA codes
thumbnail Hackers exploit VMware ESXi, Microsoft SharePoint zero-days at Pwn2Own
thumbnail US man who hacked SEC's X account to spike Bitcoin price sentenced to prison | TechCrunch
thumbnail Expression Payloads Meet Mayhem - Ivanti EPMM Unauth RCE Chain (CVE-2025-4427 and CVE-2025-4428)
thumbnail Trump's sanctions on ICC prosecutor have halted tribunal's work
thumbnail EU bug database fully operational as US slashes infosec
thumbnail Open-source toolset of an Ivanti CSA attacker
thumbnail Breaking Out of Restricted Mode: XSS to RCE in Visual Studio Code
thumbnail La cybersecurity del Vaticano è un colabrodo?
thumbnail Ivanti warns of critical Neurons for ITSM auth bypass flaw
thumbnail China-Nexus Nation State Actors Exploit SAP NetWeaver (CVE-2025-31324) to Target Critical Infrastructures
thumbnail Excel(ent) Obfuscation: Regex Gone Rogue
thumbnail ETH Zurich researchers discover new security vulnerability in Intel processors | ETH Zurich
thumbnail COLDRIVER Using New Malware To Steal Documents From Western Targets and NGOs
thumbnail Marks & Spencer hackers appear to protect ‘former Soviet states’ from attacks | The Observer
thumbnail Can You Really Trust That Permission Pop-Up On macOS? (CVE-2025-31250) | Watch This Space
thumbnail Marks & Spencer confirms customers' personal data was stolen in hack | TechCrunch
thumbnail Dior’s China data breach exposes elite clients
thumbnail Hackers now testing ClickFix attacks against Linux targets
thumbnail Threat Brief: CVE-2025-31324
thumbnail Attacco hacker a Roma Tre, siti dell'Università inaccessibili. «Tutto il settore tecnico impegnato per il ripristino»
thumbnail [CVE-2025-37752] Two Bytes Of Madness: Pwning The Linux Kernel With A 0x0000 Written 262636 Bytes Out-Of-Bounds
thumbnail RATatouille: A Malicious Recipe Hidden in rand-user-agent (Supply Chain Compromise)
thumbnail UK pioneering global move away from passwords
thumbnail Schneier warns that AI loses integrity due to corporate bias
thumbnail Malicious PyPI Package Targets Discord Developers with Remot...
thumbnail DOGE software engineer’s computer infected by info-stealing malware - Ars Technica
thumbnail Microsoft Dynamics 365 Customer Voice Phishing Scam
thumbnail Multiple vulnerabilities in SonicWall SMA 100 series (FIXED)
thumbnail On Lockbit's plaintext passwords
thumbnail NSO Group must pay more than $167 million in damages to WhatsApp for spyware campaign | TechCrunch
thumbnail LockBit ransomware gang hacked, victim negotiations exposed
thumbnail DDoS-for-hire empire brought down: Poland arrests 4 administrators, US seizes 9 domains | Europol
thumbnail Police takes down six DDoS-for-hire services, arrests admins
thumbnail Betrugsmasche mit gefälschten Postquittungen
thumbnail Evil Deno: Abusing the Nicest JavaScript Runtime: Taggart Tech
thumbnail Sharp rise in reported cyber incidents in Switzerland
thumbnail Signal clone used by Trump official stops operations after report it was hacked
thumbnail wget to Wipeout: Malicious Go Modules Fetch Destructive Payload
thumbnail Linux wiper malware hidden in malicious Go modules on GitHub
thumbnail CVE-2024-7399
thumbnail Security Researchers Warn a Widely Used Open Source Tool Poses a 'Persistent' Risk to the US
thumbnail DragonForce Ransomware Gang | From Hacktivists to High Street Extortionists
thumbnail Backdoor found in popular ecommerce components
thumbnail Exposing Darcula: a rare look behind the scenes of a global Phishing-as-a-Service operation
thumbnail I StealC You: Tracking the Rapid Changes To StealC
thumbnail macOS Vulnerabilities: A Year of Security Research at Kandji
thumbnail The Signal Clone the Trump Admin Uses Was Hacked
thumbnail MCP Prompt Injection: Not Just For Evil
thumbnail Top Tier Target | What It Takes to Defend a Cybersecurity Company from Today's Adversaries | SentinelOne
thumbnail Russie – Attribution de cyberattaques contre la France au service de renseignement militaire russe (APT28) (29.04.25) - Ministère de l’Europe et des Affaires étrangères
thumbnail Eight countries launch Operational Taskforce to tackle violence-as-a-service
thumbnail Hitachi Vantara takes servers offline after Akira ransomware attack
thumbnail NCSC statement: Incident impacting retailers
thumbnail Ransomware attacks on food and agriculture industry have doubled in 2025 | The Record from Recorded Future News
thumbnail SonicBoom, From Stolen Tokens to Remote Shells - SonicWall SMA (CVE-2023-44221, CVE-2024-38475)
thumbnail Harrods is latest retailer to be hit by cyber-attack | Harrods | The Guardian
thumbnail Active Subscription Scam Campaigns Flooding the Internet
thumbnail Ledger scammers are sending letters to steal seed phrases
thumbnail Grafana security update: no customer impact from GitHub workflow vulnerability
thumbnail Using Trusted Protocols Against You: Gmail as a C2 Mechanism...
thumbnail Windows RDP lets you log in using revoked passwords. Microsoft is OK with that.
thumbnail TheWizards APT group uses SLAAC spoofing to perform adversary-in-the-middle attacks
thumbnail Some M&S stores left with empty shelves after cyber attack
thumbnail Hello 0-Days, My Old Friend: A 2024 Zero-Day Exploitation Analysis
thumbnail Introducing ToyMaker, an initial access broker working in cahoots with double extortion gangs
thumbnail Navigating Through The Fog
thumbnail Did 5G kill the IMSI catcher?
thumbnail Despite Recent Security Hardening, Entra ID Synchronization Feature Remains Open for Abuse
thumbnail European Parliament’s Iran delegation chair victim of Tehran-linked hacking
thumbnail British firms urged to hold video or in-person interviews amid North Korea job scam | Technology | The Guardian
thumbnail CyberAv3ngers: The Iranian Saboteurs Hacking Water and Gas Systems Worldwide
thumbnail 2025 Q1 Trends in Vulnerability Exploitation | Blog | VulnCheck
thumbnail Proton66 Part 1: Mass Scanning and Exploit Campaigns
thumbnail A Chinese AI video startup appears to be blocking politically sensitive images | TechCrunch
thumbnail M&S stops online orders and issues refunds after cyber attack
thumbnail Russian Infrastructure Plays Crucial Role in North Korean Cybercrime Operations | Trend Micro (US)
thumbnail Fake GIF Leveraged in Multi-Stage Reverse-Proxy Card Skimming Attack
thumbnail SAP fixes suspected Netweaver zero-day exploited in attacks
thumbnail Largest telecom in Africa warns of cyber incident exposing customer data | The Record from Recorded Future News
thumbnail How to steal the internet
thumbnail StarCraft 2 Hackers Forcing Players To Watch Shooting Videos
thumbnail ReliaQuest Uncovers Potential New Vulnerability in SAP NetWeaver
thumbnail M-Trends 2025: Data, Insights, and Recommendations From the Frontlines
thumbnail UK bans export of video game controllers to Russia to hinder attack drone pilots
thumbnail Fire In The Hole, We’re Breaching The Vault - Commvault Remote Code Execution (CVE-2025-34028)
thumbnail 9X Surge in Ivanti Connect Secure Scanning Activity
thumbnail JFrog Detects Malicious PyPi package Stealing Crypto Tokens
thumbnail International investigation disrupts phishing-as-a-service platform LabHost
thumbnail Emerging Phishing Techniques: New Threats and Attack Vectors
thumbnail DslogdRAT Malware Installed in Ivanti Connect Secure
thumbnail The State of Ransomware in the First Quarter of 2025: Record-Breaking 126% Spike in Public Extortion Cases
thumbnail Cookie-Bite: How Your Digital Crumbs Let Threat Actors Bypass MFA and Maintain Access to Cloud Environments
thumbnail Incident update: Mitigating a DDoS attack on April 21, 2025
thumbnail XRP supply chain attack: Official NPM package infected with crypto stealing backdoor
thumbnail Thousands of Baltimore students, teachers affected by data breach following February ransomware attack
thumbnail Cisco Webex bug lets hackers gain code execution via meeting links
thumbnail Phishing for Codes: Russian Threat Actors Target Microsoft 365 OAuth Workflows
thumbnail Google Spoofed Via DKIM Replay Attack
thumbnail Phishers abuse Google OAuth to spoof Google in DKIM replay attack
thumbnail Widespread Microsoft Entra lockouts tied to new security feature rollout
thumbnail SuperCard X: exposing a Chinese-speaker MaaS for NFC Relay fraud operation
thumbnail npm Malware Targets Telegram Bot Developers with Persistent SSH Backdoors
thumbnail Silicon Valley crosswalk buttons hacked to imitate Musk, Zuckerberg's voices
thumbnail Is Ivanti the problem or a symptom of a systemic issue with network devices?
thumbnail Threat actors misuse Node.js to deliver malware and other malicious payloads | Microsoft Security Blog
thumbnail PasivRobber: Chinese Spyware or Security Tool?
thumbnail The Ever-Evolving Threat of the Russian-Speaking Cybercriminal Underground | Trend Micro (US)
thumbnail Cyberattaque sur le réseau informatique de l'UCBA - UCBA
thumbnail MITRE warns that funding for critical CVE program expires today
thumbnail China accuses NSA of launching cyberattacks on Asian Winter Games
thumbnail "Rejoignez-nous" : ce que révèle le procès de deux agents de Wagner sur leur activité en Europe
thumbnail SSL/TLS certificates will last 47 days max by 2029
thumbnail Hack The Sandbox: Unveiling the Truth Behind Disappearing Artifacts - Researcher Blog - ITOCHU Cyber & Intelligence Inc.
thumbnail Exploitation of CLFS zero-day leads to ransomware activity
thumbnail Researcher uncovers dozens of sketchy Chrome extensions with 4 million installs - Ars Technica
thumbnail Searching for something unknow
thumbnail Darknet’s Xanthorox AI Offers Customizable Tools for Hacker
thumbnail Gamaredon's Evolving Cyber Threats: A Closer Look
thumbnail OCC Notifies Congress of Incident Involving Email System
thumbnail Hackers breach Morocco's social security database in unprecedented cyberattack
thumbnail China admitted its role in Volt Typhoon cyberattacks on U.S. infrastructure
thumbnail Germany suspects Russian cyber attack on research group
thumbnail Algerian hackers leak sensitive data from Morocco's CNSS and Ministry of Employment
thumbnail The Rise of Slopsquatting: How AI Hallucinations Are Fueling a New Class of Supply Chain Attacks
thumbnail OpenAI helps spammers plaster 80,000 sites with messages that bypassed filters
thumbnail AkiraBot | AI-Powered Bot Bypasses CAPTCHAs, Spams Websites At Scale
thumbnail CVE-2025-22457
thumbnail Popular French retailers confirm hackers stole customer data
thumbnail Inside Black Basta: Uncovering the Secrets of a Ransomware Powerhouse
thumbnail A miner and the ClipBanker Trojan being distributed via SourceForge | Securelist
thumbnail NCSC issues warning over Chinese Moonshine and BadBazaar spyware
thumbnail Don't open that file in WhatsApp for Windows just yet
thumbnail Anatomy of an LLM RCE
thumbnail EncryptHub's dual life: Cybercriminal vs Windows bug-bounty researcher
thumbnail Russia arrests CEO of tech company linked to Doppelgänger disinformation campaign
thumbnail Carding tool abusing WooCommerce API downloaded 34K times on PyPI
thumbnail Someone hacked ransomware gang Everest’s leak site
thumbnail British Army and Royal Navy hit by cyberattacks from pro-Russian and pro-Palestinian hackers | The Standard
thumbnail IngressNightmare | Critical Unauthenticated RCE Vulnerabilities in Kubernetes Ingress NGINX
thumbnail Google Online Security Blog: Google announces Sec-Gemini v1, a new experimental cybersecurity model
thumbnail One Time Pwnage: SEAL Releases Advisory On SLOVENLY COMET
thumbnail Someone is trying to recruit security researchers in bizarre hacking campaign  | TechCrunch
thumbnail Surge in Palo Alto Networks Scanner Activity Indicates Possible Upcoming Threats
thumbnail TTP - Apple Offers Apps With Ties to Chinese Military
thumbnail Outlaw Linux Malware: Persistent, Unsophisticated, and Surprisingly Effective — Elastic Security Labs
thumbnail Oracle privately confirms Cloud breach to customers
thumbnail Global crackdown on Kidflix, a major child sexual exploitation platform with almost two million users | Europol
thumbnail PhaaS actor uses DoH and DNS MX to dynamically distribute phishing
thumbnail It takes two: The 2025 Sophos Active Adversary Report
thumbnail Hacktivists Target France Over Diplomatic Moves
thumbnail Russian Hacktivists Target Energy And Water Infrastructure
thumbnail Tomcat in the Crosshairs: New Research Reveals Ongoing Attacks
thumbnail Apple belatedly fixes exploited flaws in older OSes
thumbnail Analyzing open-source bootloaders: Finding vulnerabilities faster with AI
thumbnail From Contagious to ClickFake Interview: Lazarus leveraging the ClickFix tactic
thumbnail CrushFTP Authentication Bypass - CVE-2025-2825
thumbnail Fake Zoom Ends in BlackSuit Ransomware
thumbnail ClickFix: Another Deceptive Social Engineering Technique
thumbnail Pulling the Threads on the Phish of Troy Hunt
thumbnail TCCing is Believing
thumbnail Hidden Malware Strikes Again: Mu-Plugins Under Attack
thumbnail Ransomware crews add EDR killers to their arsenal
thumbnail Oracle Health breach compromises patient data at US hospitals
thumbnail SAMLStorm: Critical Authentication Bypass in xml-crypto and Node.js libraries
thumbnail Malware found on npm infecting local package with reverse shell
thumbnail CVE-2025-29927: Next.js Middleware Authorization Bypass
thumbnail Micropatches released for SCF File NTLM Hash Disclosure Vulnerability (0day)
thumbnail GorillaBot: Technical Analysis and Code Similarities with Mirai
thumbnail Troy Hunt: A Sneaky Phish Just Grabbed my Mailchimp Mailing List
thumbnail VanHelsing, new RaaS in Town
thumbnail Weaver Ant: Tracking a China-Nexus Cyber Espionage Operation
thumbnail Chinese hackers spent four years inside Asian telco’s networks
thumbnail VanHelsing Ransomware
thumbnail Resurgence of In-The-Wild Activity Targeting Critical ServiceNow Vulnerabilities
thumbnail Oracle denies breach after hacker claims theft of 6 million data records
thumbnail Large enterprises scramble after supply-chain attack spills their secrets
thumbnail How to find Next.js on your network
thumbnail Next.js Middleware Exploit: Deep Dive into CVE-2025-29927 Authorization Bypass - ZeroPath Blog
thumbnail Phishing campaign impersonates Booking .com, delivers a suite of credential-stealing malware
thumbnail SSD Advisory - Linux kernel hfsplus slab-out-of-bounds Write - SSD Secure Disclosure
thumbnail Exploit Attempts for Cisco Smart Licensing Utility CVE-2024-20439 and CVE-2024-20440
thumbnail VSCode extensions found downloading early-stage ransomware
thumbnail Critical Veeam Backup & Replication CVE-2025-23120
thumbnail Virtue or Vice? A First Look at Proliferating Spyware Operations
thumbnail Secure Annex - Enterprise Browser Extension Security & Management Platform
thumbnail Over 16.8 Billion Records Exposed as Data Breaches Increase 6%
thumbnail Cobalt Strike 4.11: Shhhhhh, Beacon is Sleeping....
thumbnail Facial Recognition Injection Attacks - An Overview
thumbnail Decrypting Encrypted files from Akira Ransomware (Linux/ESXI variant 2024) using a bunch of GPUs
thumbnail Akira ransomware can be cracked with sixteen RTX 4090 GPUs in around ten hours — new counterattack breaks encryption | Tom's Hardware
thumbnail Inside BRUTED: Black Basta (RaaS) Members Used Automated Brute Forcing Framework to Target Edge Network Devices
thumbnail Les filiales Spar et les magasins TopCC ont été victimes d’une cyberattaque
thumbnail ICANN moves to retire Soviet-era .SU country domain name - Domain Name Wire
thumbnail Exclusive: Hackers claim cyber attack on Trump winery, golf courses
thumbnail NIST Selects HQC as Fifth Algorithm for Post-Quantum Encryption
thumbnail North Korean government hackers snuck spyware on Android app store | TechCrunch
thumbnail Lookout Discovers North Korean APT37 Mobile Spyware | Threat Intel
thumbnail DOGE axes CISA ‘red team’ staffers amid ongoing federal cuts | TechCrunch
thumbnail Medusa Ransomware Activity Continues to Increase
thumbnail GreyNoise Detects Mass Exploitation of Critical PHP-CGI Vulnerability (CVE-2024-4577)
thumbnail Google paid $12 million in bug bounties last year to security researchers
thumbnail Swiss critical sector faces new 24-hour cyberattack reporting rule
thumbnail ENQUETE. "TrackingFiles" : comment la vie privée de militaires, de diplomates et du personnel politique français est exposée par les données de géolocalisation
thumbnail Undocumented "backdoor" found in Bluetooth chip used by a billion devices
thumbnail DPRK IT Fraud Network Uses GitHub to Target Global Companies
thumbnail North Korean Fake IT Workers Leverage GitHub to Build Personas
thumbnail Data breach at Japanese telecom giant NTT hits 18,000 companies
thumbnail Thousands of websites hit by four backdoors in 3rd party JavaScript attack
thumbnail Silk Typhoon targeting IT supply chain
thumbnail District of Columbia | Chinese Nationals with Ties to the PRC Government and “APT27” Charged in a Computer Hacking Campaign for Profit, Targeting Numerous U.S. Companies, Institutions, and Municipalities | United States Department of Justice
thumbnail Blog: Zen and the Art of Microcode Hacking
thumbnail Cisco warns of Webex for BroadWorks flaw exposing credentials
thumbnail New DDoS Botnet Discovered: Over 30,000 Hacked Devices, Majority of Observed Activity Traced to Iran
thumbnail Des cybercriminels s'en prennent à Cistec, fournisseur suisse de système clinique | ICTjournal
thumbnail 360XSS: Mass Website Exploitation via Virtual Tour Framework for SEO Poisoning
thumbnail Zapier says someone broke into its code repositories and may have accessed customer data
thumbnail Spyzie stalkerware is spying on thousands of Android and iPhone users
thumbnail Le plus grave incident de sécurité jamais connu par la Sûreté de l'État: "Des pirates informatiques chinois ont pu rentrer dans ce logiciel"
thumbnail Cellebrite zero-day exploit used to target phone of Serbian student activist - Amnesty International Security Lab
thumbnail Researchers uncover unknown Android flaws used to hack into a student's phone
thumbnail Exclusive: Hegseth orders Cyber Command to stand down on Russia planning
thumbnail Trump administration retreats in fight against Russian cyber threats
thumbnail Ransomware : sur la piste trouble de l’un des leaders de Black Basta
thumbnail Cellebrite suspends Serbia as customer after claims police used firm's tech to plant spyware | TechCrunch
thumbnail Confluence Exploit Leads to LockBit Ransomware
thumbnail Lumma Stealer Chronicles: PDF-themed Campaign Using Compromised Educational Institutions' Infrastructure
thumbnail Researchers accuse North Korea of $1.4 billion Bybit crypto heist
thumbnail An Update on Fake Updates: Two New Actors, and New Mac Malware
thumbnail Xerox Versalink C7025 Multifunction Printer: Pass-Back Attack Vuln (Fixed) | Rapid7 Blog
thumbnail WordPress ClickFix Malware Causes Google Warnings and Infected Computers
thumbnail Beware: PayPal "New Address" feature abused to send phishing emails
thumbnail Weathering the storm: In the midst of a Typhoon
thumbnail Black Basta is latest ransomware group to be hit by leak of chat logs
thumbnail CISA and FBI: Ghost ransomware breached orgs in 70 countries
thumbnail UK healthcare giant HCRG confirms hack after ransomware gang claims theft of sensitive data
thumbnail OpenSSH bugs threaten enterprise security, uptime
thumbnail Threat Spotlight: Inside the World's Fastest Rising Ransomware Operator — BlackLock
thumbnail Ecuador's legislature says hackers attempted to access confidential information
thumbnail Microsoft spots XCSSET macOS malware variant used for crypto theft
thumbnail CVE-2022-31631: High-Risk PHP Vulnerability Demands Immediate Patch
thumbnail Network Security Issues in RedNote
thumbnail Investigating Anonymous VPS services used by Ransomware Gangs
thumbnail Hidden Backdoors Uncovered in WordPress Malware Investigation
thumbnail Sweden’s PM on suspected cable sabotage: ‘We don’t believe random things suddenly happen quite often’
thumbnail Storm-2372 conducts device code phishing campaign
thumbnail PirateFi game on Steam caught installing password-stealing malware
thumbnail Key figures behind Phobos and 8Base ransomware arrested in international cybercrime crackdown
thumbnail Cyberattack disrupts Lee newspapers' operations across the US
thumbnail Spyware maker caught distributing malicious Android apps for years | TechCrunch
thumbnail An Italian journalist speaks about being targeted with Paragon spyware
thumbnail CVE-2024-12356
thumbnail Dutch police say they took down 127 servers used by sanctioned hosting service | The Record from Recorded Future News
thumbnail Multiple Russian Threat Actors Targeting Microsoft Device Code Authentication
thumbnail Cybercrime: A Multifaceted National Security Threat
thumbnail New Exploitation Surge: Attackers Target ThinkPHP and ownCloud Flaws at Scale | GreyNoise Blog
thumbnail Sky ECC encrypted service distributors arrested in Spain, Netherlands
thumbnail New UK sanctions target Russian cybercrime network
thumbnail Four alleged hackers arrested in Phuket for hacking 17 Swiss firms
thumbnail 8 Million Requests Later, We Made The SolarWinds Supply Chain Attack Look Amateur
thumbnail Go Module Mirror served backdoor to devs for 3+ years - Ars Technica
thumbnail Spain arrests suspected hacker of US and Spanish military agencies
thumbnail British engineering firm IMI discloses breach, shares no details
thumbnail Ransomware payments dropped 35% in 2024
thumbnail Active Directory Domain Services Elevation of Privilege Vulnerability (CVE-2025-21293)
thumbnail CVE-2025-0411: Ukrainian Organizations Targeted in Zero-Day Campaign and Homoglyph Attacks
thumbnail U.S. Government Disclosed 39 Zero-Day Vulnerabilities in 2023, Per First-Ever Report
thumbnail BSI analysis shows: Nextcloud server stored passwords in plain text | heise online
thumbnail Arma Reforger And DayZ DDOS Attack Continues, Devs "Making Progress"
thumbnail Kimsuky hackers use new custom RDP Wrapper for remote access
thumbnail Deloitte to provide Rhode Island $5M for ransomware recovery
thumbnail Code injection attacks using publicly disclosed ASP.NET machine keys
thumbnail Critical Cisco ISE bug can let attackers run commands as root
thumbnail Swissmem: vol de donnée par des hackers russes
thumbnail Spyware maker Paragon terminates contract with Italian government: media reports | TechCrunch
thumbnail Law enforcement hammered cybercrime in 2024. Is it…
thumbnail Genève: un fournisseur de logiciels bancaires piraté | Tribune de Genève
thumbnail Unpacking the BADBOX Botnet with Censys
thumbnail Router maker Zyxel tells customers to replace vulnerable hardware exploited by hackers
thumbnail Zyxel Telnet Vulnerabilities
thumbnail SparkCat crypto stealer in Google Play and App Store
thumbnail macOS FlexibleFerret | Further Variants of DPRK Malware Family Unearthed
thumbnail Une cyberattaque paralyse Radio Top et Tele Top à Winterthour
thumbnail How Switzerland is caught up in Russia’s propaganda machine
thumbnail Recent Jailbreaks Demonstrate Emerging Threat to DeepSeek
thumbnail Live Chat Blog #2: Cisco Webex Connect - Access to millions of chats histories
thumbnail Exposed SMB: The Hidden Risk Behind ‘WantToCry’ Ransomware Attacks
thumbnail Eradicating trivial vulnerabilities, at scale
thumbnail DeepSeek’s Popular AI App Is Explicitly Sending US Data to China | WIRED
thumbnail Tbilisi public transport hacked, playing pro-European messages
thumbnail Tata Technologies says ransomware attack hit IT assets, investigation ongoing
thumbnail X Phishing | Campaign Targeting High Profile Accounts Returns, Promoting Crypto Scams
thumbnail Swiss tax authority forced to buy Bahamas domain name after URL typo
thumbnail Active Exploitation of Zero-day Zyxel CPE Vulnerability (CVE-2024-40891)
thumbnail Norway seizes ship suspected of sabotage, says crew are Russian nationals
thumbnail 10,000 WordPress Websites Found Delivering MacOS and Windows Malware
thumbnail Wiz Research Uncovers Exposed DeepSeek Database Leaking Sensitive Information, Including Chat History | Wiz Blog
thumbnail New TorNet backdoor seen in widespread campaign
thumbnail After security breach at D-Trust: CCC speaks of "cyber window-dressing" | heise online
thumbnail Salt Typhoon: An Analysis of Vulnerabilities Exploited by this State-Sponsored Actor
thumbnail Updated: Frederick Health takes systems offline due to ransomware attack
thumbnail Unmasking FleshStealer: A New Infostealer Threat in 2025
thumbnail OpenAI launches ChatGPT Gov for U.S. government agencies
thumbnail Apple fixes this year’s first actively exploited zero-day bug
thumbnail Cobalt Strike and a Pair of SOCKS Lead to LockBit Ransomware
thumbnail UnitedHealth updates number of data breach victims to 190 million
thumbnail Mysterious backdoor found on select Juniper routers
thumbnail 48,000+ internet-facing Fortinet firewalls still open to attack
thumbnail The J-Magic Show: Magic Packets and Where to find them - Lumen Blog
thumbnail HellCat and Morpheus | Two Brands, One Payload as Ransomware Affiliates Drop Identical Code
thumbnail 2024 macOS Malware Review | Infostealers, Backdoors, and APT Campaigns Targeting the Enterprise
thumbnail How A Large-Scale Russian Botnet Operation Stays Under the Radar
thumbnail fasthttp Used in New Bruteforce Campaign
thumbnail Targeted supply chain attack against Chrome browser extensions
thumbnail Government and university websites targeted in ScriptAPI[.]dev client-side attack - c/side
thumbnail Hundreds of fake Reddit sites push Lumma Stealer malware
thumbnail Google launches customizable Web Store for Enterprise extensions
thumbnail Malware Redirects WordPress Traffic to Harmful Sites
thumbnail Analyse de la cybersécurité des systèmes d’information hospitaliers (SIH)
thumbnail Swiss cities targeted by Russian hackers during WEF
thumbnail Mass Campaign of Murdoc Botnet Mirai: A New Variant of Corona Mirai | Qualys Security Blog
thumbnail Record-breaking 5.6 Tbps DDoS attack and global DDoS trends for 2024 Q4
thumbnail Malicious extensions circumvent Google’s remote code ban
thumbnail Researchers Accessed Windows BitLocker Encrypted Files Disassembling the Laptop
thumbnail IoT Botnet Linked to Large-scale DDoS Attacks Since the End of 2024
thumbnail Will the Real Volt Typhoon Please Stand Up?
thumbnail Gootloader inside out
thumbnail FBI Warns iPhone, Android, Windows Users—Do Not Install These Apps
thumbnail RansomHub Affiliate leverages Python-based backdoor
thumbnail The great Google Ads heist: criminals ransack advertiser accounts via fake Google ads
thumbnail Banshee: The Stealer That "Stole Code" From MacOS XProtect
thumbnail Europe readies ‘action plan’ to secure hospitals from crippling cyberattacks – POLITICO
thumbnail Bolstering the cybersecurity of the healthcare sector
thumbnail Passkeys: they're not perfect but they're getting better
thumbnail Under the cloak of UEFI Secure Boot: Introducing CVE-2024-7344
thumbnail sfewer-r7's assessment of CVE-2025-0282
thumbnail Chinese hackers breached US government office that assesses foreign investments for national security risks
thumbnail EU law enforcement training agency data breach: Data of 97,000 individuals compromised - Help Net Security
thumbnail French submarine crew accidentally leak sensitive information through Strava app | Euronews
thumbnail Ransomware roundup: 2024 end-of-year report - Comparitech
thumbnail Après l’attaque par rançongiciel, la PME bretonne fait condamner ...
thumbnail Gootloader inside out – Sophos News
thumbnail Over 5,000 WordPress sites caught in WP3.XYZ malware attack
thumbnail IntelBroker Unmasked: KELA’s In-Depth Analysis of a Cybercrime Leader
thumbnail Luxembourg government websites knocked offline in latest cyberattack | Luxembourg Times
thumbnail Telefonica Breach Exposes Jira Tickets, Customer Data
thumbnail Victime d'une cyberattaque début décembre, VidyMed a restauré les données ciblées (update)
thumbnail Cracking the Code: How Banshee Stealer Targets macOS Users
thumbnail Ransomware abuses Amazon AWS feature to encrypt S3 buckets
thumbnail UK domain giant Nominet confirms cybersecurity incident linked to Ivanti VPN hacks | TechCrunch
thumbnail Scholastic Hack: Furry Finds 8 Million People Exposed
thumbnail Industrial networking manufacturer Moxa reports 'critical' router bugs
thumbnail Backdooring Your Backdoors - Another $20 Domain, More Governments
thumbnail Inside FireScam : An Information Stealer with Spyware Capabilities
thumbnail “Can you try a game I made?” Fake game sites lead to information stealers
thumbnail Telegram hands over data on thousands of users to US law enforcement
thumbnail Microsoft moves to disrupt hacking-as-a-service scheme that’s bypassing AI safety measures
thumbnail Green Bay Packers' online store hacked to steal credit cards
thumbnail UN aviation agency ‘investigating’ security breach after hacker claims theft of personal data
thumbnail Information Stealer Masquerades as LDAPNightmare (CVE-2024-49113) PoC Exploit
thumbnail Hackers Claim Massive Breach of Location Data Giant, Threaten to Leak Data
thumbnail Ivanti Connect Secure VPN Targeted in New Zero-Day Exploitation
thumbnail CVE-2025-0282: Ivanti Connect Secure zero-day exploited in the wild | Rapid7 Blog
thumbnail "Ils nous ont contactés via une messagerie cryptée pour obtenir une rançon" : cette cyberattaque rend la vie impossible aux éleveurs
thumbnail Casio says hackers stole personal data of 8,500 people during October ransomware attack
thumbnail PowerSchool hack exposes student, teacher data from K-12 districts
thumbnail Hackers reportedly compromise Argentina’s airport security payroll system | The Record from Recorded Future News
thumbnail Chinese hackers also breached Charter and Windstream networks
thumbnail Rhode Island warns of cybercriminals leaking stolen state files as Deloitte works to restore system
thumbnail US sanctions Chinese cyber firm linked to Flax Typhoon hacks | TechCrunch