thumbnail Round 2: Change Healthcare Targeted in Second Ransomware Attack
thumbnail A Vigilante Hacker Took Down North Korea’s Internet. Now He’s Taking Off His Mask
thumbnail PyPI halted new users and projects while it fended off supply-chain attack
thumbnail Thousands of servers hacked in ongoing attack targeting Ray AI framework
thumbnail Managing Attack Surface | Huntress Blog
thumbnail GitHub besieged by millions of malicious repositories in ongoing attack | Ars Technica
thumbnail Midnight Blizzard: Guidance for responders on nation-state attack
thumbnail Microsoft's Top Execs' Emails Breached in Sophisticated Russia-Linked APT Attack
thumbnail Google Search Overwhelmed By Massive Spam Attack
thumbnail SSH protects the world’s most sensitive networks. It just got a lot weaker
thumbnail The Curious Case of Predatory Sparrow
thumbnail New BLUFFS attack lets attackers hijack Bluetooth connections
thumbnail Surge in QR Code Quishing: Check Point Records 587% Attack Spike
thumbnail New GPU Side-Channel Attack Allows Malicious Websites to Steal Data
thumbnail When MFA isn't actually MFA
thumbnail Guarding the Bridge: New Attack Vectors in Azure AD Connect
thumbnail The five-day job: A BlackByte ransomware intrusion case study
thumbnail NCSC marks 20th anniversary of first response to state-sponsored cyber attack
thumbnail Here’s how long it takes new BrutePrint attack to unlock 10 different smartphones
thumbnail New victims come forward after mass-ransomware attack
thumbnail No Pineapple! –DPRK Targeting of Medical Research and Technology Sector
thumbnail NortonLifeLock warns that hackers breached Password Manager accounts
thumbnail Schools hit by cyber attack and documents leaked
thumbnail Guardian hit by serious IT incident believed to be ransomware attack
thumbnail Phylum Discovers Dozens More PyPI Packages Attempting to Deliver W4SP Stealer in Ongoing Supply-Chain Attack
thumbnail Melting the DNS Iceberg: Taking over your infrastructure Kaminsky style
thumbnail Threat Alert: Private npm Packages Disclosed via Timing Attacks
thumbnail Software Supply Chain Attackers; Organized, Persistent, and Operating for over a Year
thumbnail Malicious OAuth applications abuse cloud email services to spread spam
thumbnail Microsoft investigates Iranian attacks against the Albanian government
thumbnail Stealing Clouds
thumbnail Legitimate SaaS Platforms Being Used to Host Phishing Attacks
thumbnail Comprehensive Threat Intelligence: Cisco Talos shares insights related to recent cyber attack on Cisco
thumbnail A New Attack Can Unmask Anonymous Users on Any Major Browser
thumbnail A new vulnerability in Intel and AMD CPUs lets hackers steal encryption keys
thumbnail PyPI package 'ctx' and PHP library 'phpass' compromised to steal environment variables
thumbnail npm Supply Chain Attack Targeting Germany-Based Companies
thumbnail How the French fiber optic cable attacks accentuate critical infrastructure vulnerabilities
thumbnail Toyota suspends domestic factory operations after suspected cyber attack
thumbnail Cyberattack targets Vodafone Portugal, disrupts services
thumbnail ‘Zero-Click’ Hacks Are Growing in Popularity. There’s Practically No Way to Stop Them
thumbnail Cyber-attack on ICRC: What we know
thumbnail Google Docs Comment Exploit Allows for Distribution of Phishing and Malware