thumbnail Hackers now testing ClickFix attacks against Linux targets
thumbnail Threat Brief: CVE-2025-31324
thumbnail Attacco hacker a Roma Tre, siti dell'Università inaccessibili. «Tutto il settore tecnico impegnato per il ripristino»
thumbnail [CVE-2025-37752] Two Bytes Of Madness: Pwning The Linux Kernel With A 0x0000 Written 262636 Bytes Out-Of-Bounds
thumbnail RATatouille: A Malicious Recipe Hidden in rand-user-agent (Supply Chain Compromise)
thumbnail UK pioneering global move away from passwords
thumbnail Schneier warns that AI loses integrity due to corporate bias
thumbnail Malicious PyPI Package Targets Discord Developers with Remot...
thumbnail DOGE software engineer’s computer infected by info-stealing malware - Ars Technica
thumbnail Microsoft Dynamics 365 Customer Voice Phishing Scam
thumbnail Multiple vulnerabilities in SonicWall SMA 100 series (FIXED)
thumbnail On Lockbit's plaintext passwords
thumbnail NSO Group must pay more than $167 million in damages to WhatsApp for spyware campaign | TechCrunch
thumbnail LockBit ransomware gang hacked, victim negotiations exposed
thumbnail DDoS-for-hire empire brought down: Poland arrests 4 administrators, US seizes 9 domains | Europol
thumbnail Police takes down six DDoS-for-hire services, arrests admins
thumbnail Betrugsmasche mit gefälschten Postquittungen
thumbnail Evil Deno: Abusing the Nicest JavaScript Runtime: Taggart Tech
thumbnail Sharp rise in reported cyber incidents in Switzerland
thumbnail Signal clone used by Trump official stops operations after report it was hacked
thumbnail wget to Wipeout: Malicious Go Modules Fetch Destructive Payload
thumbnail Linux wiper malware hidden in malicious Go modules on GitHub
thumbnail CVE-2024-7399
thumbnail Security Researchers Warn a Widely Used Open Source Tool Poses a 'Persistent' Risk to the US
thumbnail DragonForce Ransomware Gang | From Hacktivists to High Street Extortionists
thumbnail Backdoor found in popular ecommerce components
thumbnail Exposing Darcula: a rare look behind the scenes of a global Phishing-as-a-Service operation
thumbnail I StealC You: Tracking the Rapid Changes To StealC
thumbnail macOS Vulnerabilities: A Year of Security Research at Kandji
thumbnail The Signal Clone the Trump Admin Uses Was Hacked
thumbnail MCP Prompt Injection: Not Just For Evil
thumbnail Top Tier Target | What It Takes to Defend a Cybersecurity Company from Today's Adversaries | SentinelOne
thumbnail Russie – Attribution de cyberattaques contre la France au service de renseignement militaire russe (APT28) (29.04.25) - Ministère de l’Europe et des Affaires étrangères
thumbnail Eight countries launch Operational Taskforce to tackle violence-as-a-service
thumbnail Hitachi Vantara takes servers offline after Akira ransomware attack
thumbnail NCSC statement: Incident impacting retailers
thumbnail Ransomware attacks on food and agriculture industry have doubled in 2025 | The Record from Recorded Future News
thumbnail SonicBoom, From Stolen Tokens to Remote Shells - SonicWall SMA (CVE-2023-44221, CVE-2024-38475)
thumbnail Harrods is latest retailer to be hit by cyber-attack | Harrods | The Guardian
thumbnail Active Subscription Scam Campaigns Flooding the Internet
thumbnail Ledger scammers are sending letters to steal seed phrases
thumbnail Grafana security update: no customer impact from GitHub workflow vulnerability
thumbnail Using Trusted Protocols Against You: Gmail as a C2 Mechanism...
thumbnail Windows RDP lets you log in using revoked passwords. Microsoft is OK with that.
thumbnail TheWizards APT group uses SLAAC spoofing to perform adversary-in-the-middle attacks
thumbnail Some M&S stores left with empty shelves after cyber attack
thumbnail Hello 0-Days, My Old Friend: A 2024 Zero-Day Exploitation Analysis
thumbnail Introducing ToyMaker, an initial access broker working in cahoots with double extortion gangs
thumbnail Navigating Through The Fog
thumbnail Did 5G kill the IMSI catcher?
thumbnail Despite Recent Security Hardening, Entra ID Synchronization Feature Remains Open for Abuse
thumbnail European Parliament’s Iran delegation chair victim of Tehran-linked hacking
thumbnail British firms urged to hold video or in-person interviews amid North Korea job scam | Technology | The Guardian
thumbnail CyberAv3ngers: The Iranian Saboteurs Hacking Water and Gas Systems Worldwide
thumbnail 2025 Q1 Trends in Vulnerability Exploitation | Blog | VulnCheck
thumbnail Proton66 Part 1: Mass Scanning and Exploit Campaigns
thumbnail A Chinese AI video startup appears to be blocking politically sensitive images | TechCrunch
thumbnail M&S stops online orders and issues refunds after cyber attack
thumbnail Russian Infrastructure Plays Crucial Role in North Korean Cybercrime Operations | Trend Micro (US)
thumbnail Fake GIF Leveraged in Multi-Stage Reverse-Proxy Card Skimming Attack
thumbnail SAP fixes suspected Netweaver zero-day exploited in attacks
thumbnail Largest telecom in Africa warns of cyber incident exposing customer data | The Record from Recorded Future News
thumbnail How to steal the internet
thumbnail StarCraft 2 Hackers Forcing Players To Watch Shooting Videos
thumbnail ReliaQuest Uncovers Potential New Vulnerability in SAP NetWeaver
thumbnail M-Trends 2025: Data, Insights, and Recommendations From the Frontlines
thumbnail UK bans export of video game controllers to Russia to hinder attack drone pilots
thumbnail Fire In The Hole, We’re Breaching The Vault - Commvault Remote Code Execution (CVE-2025-34028)
thumbnail 9X Surge in Ivanti Connect Secure Scanning Activity
thumbnail JFrog Detects Malicious PyPi package Stealing Crypto Tokens
thumbnail International investigation disrupts phishing-as-a-service platform LabHost
thumbnail Emerging Phishing Techniques: New Threats and Attack Vectors
thumbnail DslogdRAT Malware Installed in Ivanti Connect Secure
thumbnail The State of Ransomware in the First Quarter of 2025: Record-Breaking 126% Spike in Public Extortion Cases
thumbnail Cookie-Bite: How Your Digital Crumbs Let Threat Actors Bypass MFA and Maintain Access to Cloud Environments
thumbnail Incident update: Mitigating a DDoS attack on April 21, 2025
thumbnail XRP supply chain attack: Official NPM package infected with crypto stealing backdoor
thumbnail Thousands of Baltimore students, teachers affected by data breach following February ransomware attack
thumbnail Cisco Webex bug lets hackers gain code execution via meeting links
thumbnail Phishing for Codes: Russian Threat Actors Target Microsoft 365 OAuth Workflows
thumbnail Google Spoofed Via DKIM Replay Attack
thumbnail Phishers abuse Google OAuth to spoof Google in DKIM replay attack
thumbnail Widespread Microsoft Entra lockouts tied to new security feature rollout
thumbnail SuperCard X: exposing a Chinese-speaker MaaS for NFC Relay fraud operation
thumbnail npm Malware Targets Telegram Bot Developers with Persistent SSH Backdoors
thumbnail Silicon Valley crosswalk buttons hacked to imitate Musk, Zuckerberg's voices
thumbnail Is Ivanti the problem or a symptom of a systemic issue with network devices?
thumbnail Threat actors misuse Node.js to deliver malware and other malicious payloads | Microsoft Security Blog
thumbnail PasivRobber: Chinese Spyware or Security Tool?
thumbnail The Ever-Evolving Threat of the Russian-Speaking Cybercriminal Underground | Trend Micro (US)
thumbnail Cyberattaque sur le réseau informatique de l'UCBA - UCBA
thumbnail MITRE warns that funding for critical CVE program expires today
thumbnail China accuses NSA of launching cyberattacks on Asian Winter Games
thumbnail "Rejoignez-nous" : ce que révèle le procès de deux agents de Wagner sur leur activité en Europe
thumbnail SSL/TLS certificates will last 47 days max by 2029
thumbnail Hack The Sandbox: Unveiling the Truth Behind Disappearing Artifacts - Researcher Blog - ITOCHU Cyber & Intelligence Inc.
thumbnail Exploitation of CLFS zero-day leads to ransomware activity
thumbnail Researcher uncovers dozens of sketchy Chrome extensions with 4 million installs - Ars Technica
thumbnail Searching for something unknow
thumbnail Darknet’s Xanthorox AI Offers Customizable Tools for Hacker
thumbnail Gamaredon's Evolving Cyber Threats: A Closer Look
thumbnail OCC Notifies Congress of Incident Involving Email System
thumbnail Hackers breach Morocco's social security database in unprecedented cyberattack
thumbnail China admitted its role in Volt Typhoon cyberattacks on U.S. infrastructure
thumbnail Germany suspects Russian cyber attack on research group
thumbnail Algerian hackers leak sensitive data from Morocco's CNSS and Ministry of Employment
thumbnail The Rise of Slopsquatting: How AI Hallucinations Are Fueling a New Class of Supply Chain Attacks
thumbnail OpenAI helps spammers plaster 80,000 sites with messages that bypassed filters
thumbnail AkiraBot | AI-Powered Bot Bypasses CAPTCHAs, Spams Websites At Scale
thumbnail CVE-2025-22457
thumbnail Popular French retailers confirm hackers stole customer data
thumbnail Inside Black Basta: Uncovering the Secrets of a Ransomware Powerhouse
thumbnail A miner and the ClipBanker Trojan being distributed via SourceForge | Securelist
thumbnail NCSC issues warning over Chinese Moonshine and BadBazaar spyware
thumbnail Don't open that file in WhatsApp for Windows just yet
thumbnail Anatomy of an LLM RCE
thumbnail EncryptHub's dual life: Cybercriminal vs Windows bug-bounty researcher
thumbnail Russia arrests CEO of tech company linked to Doppelgänger disinformation campaign
thumbnail Carding tool abusing WooCommerce API downloaded 34K times on PyPI
thumbnail Someone hacked ransomware gang Everest’s leak site
thumbnail British Army and Royal Navy hit by cyberattacks from pro-Russian and pro-Palestinian hackers | The Standard
thumbnail IngressNightmare | Critical Unauthenticated RCE Vulnerabilities in Kubernetes Ingress NGINX
thumbnail Google Online Security Blog: Google announces Sec-Gemini v1, a new experimental cybersecurity model
thumbnail One Time Pwnage: SEAL Releases Advisory On SLOVENLY COMET
thumbnail Someone is trying to recruit security researchers in bizarre hacking campaign  | TechCrunch
thumbnail Surge in Palo Alto Networks Scanner Activity Indicates Possible Upcoming Threats
thumbnail TTP - Apple Offers Apps With Ties to Chinese Military
thumbnail Outlaw Linux Malware: Persistent, Unsophisticated, and Surprisingly Effective — Elastic Security Labs
thumbnail Oracle privately confirms Cloud breach to customers
thumbnail Global crackdown on Kidflix, a major child sexual exploitation platform with almost two million users | Europol
thumbnail PhaaS actor uses DoH and DNS MX to dynamically distribute phishing
thumbnail It takes two: The 2025 Sophos Active Adversary Report
thumbnail Hacktivists Target France Over Diplomatic Moves
thumbnail Russian Hacktivists Target Energy And Water Infrastructure
thumbnail Tomcat in the Crosshairs: New Research Reveals Ongoing Attacks
thumbnail Apple belatedly fixes exploited flaws in older OSes
thumbnail Analyzing open-source bootloaders: Finding vulnerabilities faster with AI
thumbnail From Contagious to ClickFake Interview: Lazarus leveraging the ClickFix tactic
thumbnail CrushFTP Authentication Bypass - CVE-2025-2825
thumbnail Fake Zoom Ends in BlackSuit Ransomware
thumbnail ClickFix: Another Deceptive Social Engineering Technique
thumbnail Pulling the Threads on the Phish of Troy Hunt
thumbnail TCCing is Believing
thumbnail Hidden Malware Strikes Again: Mu-Plugins Under Attack
thumbnail Ransomware crews add EDR killers to their arsenal
thumbnail Oracle Health breach compromises patient data at US hospitals
thumbnail SAMLStorm: Critical Authentication Bypass in xml-crypto and Node.js libraries
thumbnail Malware found on npm infecting local package with reverse shell
thumbnail CVE-2025-29927: Next.js Middleware Authorization Bypass
thumbnail Micropatches released for SCF File NTLM Hash Disclosure Vulnerability (0day)
thumbnail GorillaBot: Technical Analysis and Code Similarities with Mirai
thumbnail Troy Hunt: A Sneaky Phish Just Grabbed my Mailchimp Mailing List
thumbnail VanHelsing, new RaaS in Town
thumbnail Weaver Ant: Tracking a China-Nexus Cyber Espionage Operation
thumbnail Chinese hackers spent four years inside Asian telco’s networks
thumbnail VanHelsing Ransomware
thumbnail Resurgence of In-The-Wild Activity Targeting Critical ServiceNow Vulnerabilities
thumbnail Oracle denies breach after hacker claims theft of 6 million data records
thumbnail Large enterprises scramble after supply-chain attack spills their secrets
thumbnail How to find Next.js on your network
thumbnail Next.js Middleware Exploit: Deep Dive into CVE-2025-29927 Authorization Bypass - ZeroPath Blog
thumbnail Phishing campaign impersonates Booking .com, delivers a suite of credential-stealing malware
thumbnail SSD Advisory - Linux kernel hfsplus slab-out-of-bounds Write - SSD Secure Disclosure
thumbnail Exploit Attempts for Cisco Smart Licensing Utility CVE-2024-20439 and CVE-2024-20440
thumbnail VSCode extensions found downloading early-stage ransomware
thumbnail Critical Veeam Backup & Replication CVE-2025-23120
thumbnail Virtue or Vice? A First Look at Proliferating Spyware Operations
thumbnail Secure Annex - Enterprise Browser Extension Security & Management Platform
thumbnail Over 16.8 Billion Records Exposed as Data Breaches Increase 6%
thumbnail Cobalt Strike 4.11: Shhhhhh, Beacon is Sleeping....
thumbnail Facial Recognition Injection Attacks - An Overview
thumbnail Decrypting Encrypted files from Akira Ransomware (Linux/ESXI variant 2024) using a bunch of GPUs
thumbnail Akira ransomware can be cracked with sixteen RTX 4090 GPUs in around ten hours — new counterattack breaks encryption | Tom's Hardware
thumbnail Inside BRUTED: Black Basta (RaaS) Members Used Automated Brute Forcing Framework to Target Edge Network Devices
thumbnail Les filiales Spar et les magasins TopCC ont été victimes d’une cyberattaque
thumbnail ICANN moves to retire Soviet-era .SU country domain name - Domain Name Wire
thumbnail Exclusive: Hackers claim cyber attack on Trump winery, golf courses
thumbnail NIST Selects HQC as Fifth Algorithm for Post-Quantum Encryption
thumbnail North Korean government hackers snuck spyware on Android app store | TechCrunch
thumbnail Lookout Discovers North Korean APT37 Mobile Spyware | Threat Intel
thumbnail DOGE axes CISA ‘red team’ staffers amid ongoing federal cuts | TechCrunch
thumbnail Medusa Ransomware Activity Continues to Increase
thumbnail GreyNoise Detects Mass Exploitation of Critical PHP-CGI Vulnerability (CVE-2024-4577)
thumbnail Google paid $12 million in bug bounties last year to security researchers
thumbnail Swiss critical sector faces new 24-hour cyberattack reporting rule
thumbnail ENQUETE. "TrackingFiles" : comment la vie privée de militaires, de diplomates et du personnel politique français est exposée par les données de géolocalisation
thumbnail Undocumented "backdoor" found in Bluetooth chip used by a billion devices
thumbnail DPRK IT Fraud Network Uses GitHub to Target Global Companies
thumbnail North Korean Fake IT Workers Leverage GitHub to Build Personas
thumbnail Data breach at Japanese telecom giant NTT hits 18,000 companies
thumbnail Thousands of websites hit by four backdoors in 3rd party JavaScript attack
thumbnail Silk Typhoon targeting IT supply chain
thumbnail District of Columbia | Chinese Nationals with Ties to the PRC Government and “APT27” Charged in a Computer Hacking Campaign for Profit, Targeting Numerous U.S. Companies, Institutions, and Municipalities | United States Department of Justice
thumbnail Blog: Zen and the Art of Microcode Hacking
thumbnail Cisco warns of Webex for BroadWorks flaw exposing credentials
thumbnail New DDoS Botnet Discovered: Over 30,000 Hacked Devices, Majority of Observed Activity Traced to Iran
thumbnail Des cybercriminels s'en prennent à Cistec, fournisseur suisse de système clinique | ICTjournal
thumbnail 360XSS: Mass Website Exploitation via Virtual Tour Framework for SEO Poisoning
thumbnail Zapier says someone broke into its code repositories and may have accessed customer data
thumbnail Spyzie stalkerware is spying on thousands of Android and iPhone users
thumbnail Le plus grave incident de sécurité jamais connu par la Sûreté de l'État: "Des pirates informatiques chinois ont pu rentrer dans ce logiciel"
thumbnail Cellebrite zero-day exploit used to target phone of Serbian student activist - Amnesty International Security Lab
thumbnail Researchers uncover unknown Android flaws used to hack into a student's phone
thumbnail Exclusive: Hegseth orders Cyber Command to stand down on Russia planning
thumbnail Trump administration retreats in fight against Russian cyber threats
thumbnail Ransomware : sur la piste trouble de l’un des leaders de Black Basta
thumbnail Cellebrite suspends Serbia as customer after claims police used firm's tech to plant spyware | TechCrunch
thumbnail Confluence Exploit Leads to LockBit Ransomware
thumbnail Lumma Stealer Chronicles: PDF-themed Campaign Using Compromised Educational Institutions' Infrastructure
thumbnail Researchers accuse North Korea of $1.4 billion Bybit crypto heist
thumbnail An Update on Fake Updates: Two New Actors, and New Mac Malware
thumbnail Xerox Versalink C7025 Multifunction Printer: Pass-Back Attack Vuln (Fixed) | Rapid7 Blog
thumbnail WordPress ClickFix Malware Causes Google Warnings and Infected Computers
thumbnail Beware: PayPal "New Address" feature abused to send phishing emails
thumbnail Weathering the storm: In the midst of a Typhoon
thumbnail Black Basta is latest ransomware group to be hit by leak of chat logs
thumbnail CISA and FBI: Ghost ransomware breached orgs in 70 countries
thumbnail UK healthcare giant HCRG confirms hack after ransomware gang claims theft of sensitive data
thumbnail OpenSSH bugs threaten enterprise security, uptime
thumbnail Threat Spotlight: Inside the World's Fastest Rising Ransomware Operator — BlackLock
thumbnail Ecuador's legislature says hackers attempted to access confidential information
thumbnail Microsoft spots XCSSET macOS malware variant used for crypto theft
thumbnail CVE-2022-31631: High-Risk PHP Vulnerability Demands Immediate Patch
thumbnail Network Security Issues in RedNote
thumbnail Investigating Anonymous VPS services used by Ransomware Gangs
thumbnail Hidden Backdoors Uncovered in WordPress Malware Investigation
thumbnail Sweden’s PM on suspected cable sabotage: ‘We don’t believe random things suddenly happen quite often’
thumbnail Storm-2372 conducts device code phishing campaign
thumbnail PirateFi game on Steam caught installing password-stealing malware
thumbnail Key figures behind Phobos and 8Base ransomware arrested in international cybercrime crackdown
thumbnail Cyberattack disrupts Lee newspapers' operations across the US
thumbnail Spyware maker caught distributing malicious Android apps for years | TechCrunch
thumbnail An Italian journalist speaks about being targeted with Paragon spyware
thumbnail CVE-2024-12356
thumbnail Dutch police say they took down 127 servers used by sanctioned hosting service | The Record from Recorded Future News
thumbnail Multiple Russian Threat Actors Targeting Microsoft Device Code Authentication
thumbnail Cybercrime: A Multifaceted National Security Threat
thumbnail New Exploitation Surge: Attackers Target ThinkPHP and ownCloud Flaws at Scale | GreyNoise Blog
thumbnail Sky ECC encrypted service distributors arrested in Spain, Netherlands
thumbnail New UK sanctions target Russian cybercrime network
thumbnail Four alleged hackers arrested in Phuket for hacking 17 Swiss firms
thumbnail 8 Million Requests Later, We Made The SolarWinds Supply Chain Attack Look Amateur
thumbnail Go Module Mirror served backdoor to devs for 3+ years - Ars Technica
thumbnail Spain arrests suspected hacker of US and Spanish military agencies
thumbnail British engineering firm IMI discloses breach, shares no details
thumbnail Ransomware payments dropped 35% in 2024
thumbnail Active Directory Domain Services Elevation of Privilege Vulnerability (CVE-2025-21293)
thumbnail CVE-2025-0411: Ukrainian Organizations Targeted in Zero-Day Campaign and Homoglyph Attacks
thumbnail U.S. Government Disclosed 39 Zero-Day Vulnerabilities in 2023, Per First-Ever Report
thumbnail BSI analysis shows: Nextcloud server stored passwords in plain text | heise online
thumbnail Arma Reforger And DayZ DDOS Attack Continues, Devs "Making Progress"
thumbnail Kimsuky hackers use new custom RDP Wrapper for remote access
thumbnail Deloitte to provide Rhode Island $5M for ransomware recovery
thumbnail Code injection attacks using publicly disclosed ASP.NET machine keys
thumbnail Critical Cisco ISE bug can let attackers run commands as root
thumbnail Swissmem: vol de donnée par des hackers russes
thumbnail Spyware maker Paragon terminates contract with Italian government: media reports | TechCrunch
thumbnail Law enforcement hammered cybercrime in 2024. Is it…
thumbnail Genève: un fournisseur de logiciels bancaires piraté | Tribune de Genève
thumbnail Unpacking the BADBOX Botnet with Censys
thumbnail Router maker Zyxel tells customers to replace vulnerable hardware exploited by hackers
thumbnail Zyxel Telnet Vulnerabilities
thumbnail SparkCat crypto stealer in Google Play and App Store
thumbnail macOS FlexibleFerret | Further Variants of DPRK Malware Family Unearthed
thumbnail Une cyberattaque paralyse Radio Top et Tele Top à Winterthour
thumbnail How Switzerland is caught up in Russia’s propaganda machine
thumbnail Recent Jailbreaks Demonstrate Emerging Threat to DeepSeek
thumbnail Live Chat Blog #2: Cisco Webex Connect - Access to millions of chats histories
thumbnail Exposed SMB: The Hidden Risk Behind ‘WantToCry’ Ransomware Attacks
thumbnail Eradicating trivial vulnerabilities, at scale
thumbnail DeepSeek’s Popular AI App Is Explicitly Sending US Data to China | WIRED
thumbnail Tbilisi public transport hacked, playing pro-European messages
thumbnail Tata Technologies says ransomware attack hit IT assets, investigation ongoing
thumbnail X Phishing | Campaign Targeting High Profile Accounts Returns, Promoting Crypto Scams
thumbnail Swiss tax authority forced to buy Bahamas domain name after URL typo
thumbnail Active Exploitation of Zero-day Zyxel CPE Vulnerability (CVE-2024-40891)
thumbnail Norway seizes ship suspected of sabotage, says crew are Russian nationals
thumbnail 10,000 WordPress Websites Found Delivering MacOS and Windows Malware
thumbnail Wiz Research Uncovers Exposed DeepSeek Database Leaking Sensitive Information, Including Chat History | Wiz Blog
thumbnail New TorNet backdoor seen in widespread campaign
thumbnail After security breach at D-Trust: CCC speaks of "cyber window-dressing" | heise online
thumbnail Salt Typhoon: An Analysis of Vulnerabilities Exploited by this State-Sponsored Actor
thumbnail Updated: Frederick Health takes systems offline due to ransomware attack
thumbnail Unmasking FleshStealer: A New Infostealer Threat in 2025
thumbnail OpenAI launches ChatGPT Gov for U.S. government agencies
thumbnail Apple fixes this year’s first actively exploited zero-day bug
thumbnail Cobalt Strike and a Pair of SOCKS Lead to LockBit Ransomware
thumbnail UnitedHealth updates number of data breach victims to 190 million
thumbnail Mysterious backdoor found on select Juniper routers
thumbnail 48,000+ internet-facing Fortinet firewalls still open to attack
thumbnail The J-Magic Show: Magic Packets and Where to find them - Lumen Blog
thumbnail HellCat and Morpheus | Two Brands, One Payload as Ransomware Affiliates Drop Identical Code
thumbnail 2024 macOS Malware Review | Infostealers, Backdoors, and APT Campaigns Targeting the Enterprise
thumbnail How A Large-Scale Russian Botnet Operation Stays Under the Radar
thumbnail fasthttp Used in New Bruteforce Campaign
thumbnail Targeted supply chain attack against Chrome browser extensions
thumbnail Government and university websites targeted in ScriptAPI[.]dev client-side attack - c/side
thumbnail Hundreds of fake Reddit sites push Lumma Stealer malware
thumbnail Google launches customizable Web Store for Enterprise extensions
thumbnail Malware Redirects WordPress Traffic to Harmful Sites
thumbnail Analyse de la cybersécurité des systèmes d’information hospitaliers (SIH)
thumbnail Swiss cities targeted by Russian hackers during WEF
thumbnail Mass Campaign of Murdoc Botnet Mirai: A New Variant of Corona Mirai | Qualys Security Blog
thumbnail Record-breaking 5.6 Tbps DDoS attack and global DDoS trends for 2024 Q4
thumbnail Malicious extensions circumvent Google’s remote code ban
thumbnail Researchers Accessed Windows BitLocker Encrypted Files Disassembling the Laptop
thumbnail IoT Botnet Linked to Large-scale DDoS Attacks Since the End of 2024
thumbnail Will the Real Volt Typhoon Please Stand Up?
thumbnail Gootloader inside out
thumbnail FBI Warns iPhone, Android, Windows Users—Do Not Install These Apps
thumbnail RansomHub Affiliate leverages Python-based backdoor
thumbnail The great Google Ads heist: criminals ransack advertiser accounts via fake Google ads | Malwarebytes
thumbnail Banshee: The Stealer That "Stole Code" From MacOS XProtect
thumbnail Europe readies ‘action plan’ to secure hospitals from crippling cyberattacks – POLITICO
thumbnail Bolstering the cybersecurity of the healthcare sector
thumbnail Passkeys: they're not perfect but they're getting better
thumbnail Under the cloak of UEFI Secure Boot: Introducing CVE-2024-7344
thumbnail sfewer-r7's assessment of CVE-2025-0282
thumbnail Chinese hackers breached US government office that assesses foreign investments for national security risks
thumbnail EU law enforcement training agency data breach: Data of 97,000 individuals compromised - Help Net Security
thumbnail French submarine crew accidentally leak sensitive information through Strava app | Euronews
thumbnail Ransomware roundup: 2024 end-of-year report - Comparitech
thumbnail Après l’attaque par rançongiciel, la PME bretonne fait condamner ...
thumbnail Gootloader inside out – Sophos News
thumbnail Over 5,000 WordPress sites caught in WP3.XYZ malware attack
thumbnail IntelBroker Unmasked: KELA’s In-Depth Analysis of a Cybercrime Leader
thumbnail Luxembourg government websites knocked offline in latest cyberattack | Luxembourg Times
thumbnail Telefonica Breach Exposes Jira Tickets, Customer Data
thumbnail Victime d'une cyberattaque début décembre, VidyMed a restauré les données ciblées (update)
thumbnail Cracking the Code: How Banshee Stealer Targets macOS Users
thumbnail Ransomware abuses Amazon AWS feature to encrypt S3 buckets
thumbnail UK domain giant Nominet confirms cybersecurity incident linked to Ivanti VPN hacks | TechCrunch
thumbnail Scholastic Hack: Furry Finds 8 Million People Exposed
thumbnail Industrial networking manufacturer Moxa reports 'critical' router bugs
thumbnail Backdooring Your Backdoors - Another $20 Domain, More Governments
thumbnail Inside FireScam : An Information Stealer with Spyware Capabilities
thumbnail “Can you try a game I made?” Fake game sites lead to information stealers
thumbnail Telegram hands over data on thousands of users to US law enforcement
thumbnail Microsoft moves to disrupt hacking-as-a-service scheme that’s bypassing AI safety measures
thumbnail Green Bay Packers' online store hacked to steal credit cards
thumbnail UN aviation agency ‘investigating’ security breach after hacker claims theft of personal data
thumbnail Information Stealer Masquerades as LDAPNightmare (CVE-2024-49113) PoC Exploit
thumbnail Hackers Claim Massive Breach of Location Data Giant, Threaten to Leak Data
thumbnail Ivanti Connect Secure VPN Targeted in New Zero-Day Exploitation
thumbnail CVE-2025-0282: Ivanti Connect Secure zero-day exploited in the wild | Rapid7 Blog
thumbnail "Ils nous ont contactés via une messagerie cryptée pour obtenir une rançon" : cette cyberattaque rend la vie impossible aux éleveurs
thumbnail Casio says hackers stole personal data of 8,500 people during October ransomware attack
thumbnail PowerSchool hack exposes student, teacher data from K-12 districts
thumbnail Hackers reportedly compromise Argentina’s airport security payroll system | The Record from Recorded Future News
thumbnail Chinese hackers also breached Charter and Windstream networks
thumbnail Rhode Island warns of cybercriminals leaking stolen state files as Deloitte works to restore system
thumbnail US sanctions Chinese cyber firm linked to Flax Typhoon hacks | TechCrunch