All Articles
ALL TIMEBrowse all curated articles across categories
England Hockey investigating ransomware data breach
HIGHEngland Hockey Faces Ransomware Data Breach Investigation
Storm-2561 uses SEO poisoning to distribute fake VPN clients for credential theft
HIGHStorm-2561 Exploits SEO to Spread Fake VPN Clients and Steal Credentials
Hive0163 Uses AI-Assisted Slopoly Malware for Persistent Access in Ransomware Attacks
HIGHHive0163 Leverages AI-Driven Slopoly Malware for Advanced Ransomware Tactics
Rust-Based VENON Malware Targets 33 Brazilian Banks with Credential-Stealing Overlays
HIGHRust-Based VENON Malware Targets Brazilian Banks with Credential Theft
From transparency to action: What the latest Microsoft email security benchmark reveals
Microsoft's Latest Email Security Benchmark Highlights Defender's Strengths
US disrupts SocksEscort proxy network powered by Linux malware
HIGHUS and European Agencies Dismantle SocksEscort Proxy Network Exploiting Linux Malware
CRITICAL: Veeam warns of critical flaws exposing backup servers to RCE attacks
CRITCritical RCE Vulnerabilities Patched in Veeam Backup & Replication
Detecting and analyzing prompt abuse in AI tools
Understanding and Mitigating AI Prompt Abuse
ThreatsDay Bulletin: OAuth Trap, EDR Killer, Signal Phishing, Zombie ZIP, AI Platform Hack & More
HIGHWeekly Security Bulletin Highlights Emerging Threats and Old Tricks
How to Scale Phishing Detection in Your SOC: 3 Steps for CISOs
HIGHScaling Phishing Detection: A Strategic Guide for CISOs
Going the Extra Mile: Travel Rewards Turn into Underground Currency.
HIGHStolen Airline Miles Fuel Underground Market as Tradable Currency
Telus Digital confirms breach after hacker claims 1 petabyte data theft
HIGHTelus Digital Breach: Hacker Claims 1 Petabyte Data Theft