All Articles
TODAYBrowse all curated articles across categories
When cloud logs fall short, the network tells the truth
Network Telemetry: The Reliable Alternative to Incomplete Cloud Logs
Romanian oil pipeline operator Conpet discloses cyberattack
HIGHCyberattack Hits Romanian Oil Pipeline Operator Conpet
ThreatsDay Bulletin: Codespaces RCE, AsyncRAT C2, BYOVD Abuse, AI Cloud Intrusions & 15+ Stories
HIGHEmerging Threats: Codespaces RCE and AI Cloud Intrusions Highlight New Attack Vectors
Newsletter platform Substack notifies users of data breach
HIGHSubstack Data Breach Exposes User Email Addresses and Phone Numbers
EU: NIS2 Update – EU Moves to Harmonise Cyber Controls, Refine Scope, and Add New In-Scope Entities
EU Proposes Amendments to NIS2 Directive for Enhanced Cybersecurity Harmonization
China: New guidance on data transfer and identification of important data in the automotive sector
China Releases New Guidance on Automotive Data Transfer
Microsoft SDL: Evolving security practices for an AI-powered world
Microsoft Enhances SDL for AI Security in a Cyberthreat Landscape
Detecting backdoored language models at scale
HIGHMicrosoft Unveils Scanner for Detecting Backdoored Language Models
DHS Holds Classified Briefing for Private Sector Election Companies
HIGHDHS Briefs Election Companies on Cyber Threats in Classified Meeting
Safeguarding and Securing Cyberspace
CISA's New Strategies for Securing Cyberspace
CRITICAL: Who Operates the Badbox 2.0 Botnet?
CRITKimwolf Botmasters Expose Badbox 2.0 Botnet Operations
Please Don’t Feed the Scattered Lapsus ShinyHunters
HIGHScattered Lapsus ShinyHunters: A New Threat in Data Ransom Tactics