All Articles
THIS MONTHBrowse all curated articles across categories
CISA Adds Actively Exploited VMware Aria Operations Flaw CVE-2026-22719 to KEV Catalog
HIGHCISA Flags Actively Exploited VMware Aria Operations Vulnerability
Paint maker giant AkzoNobel confirms cyberattack on U.S. site
HIGHAkzoNobel Confirms Cyberattack on U.S. Operations
Signed malware impersonating workplace apps deploys RMM backdoors
HIGHSigned Malware Uses Stolen EV Certificate to Deploy RMM Backdoors
Microsoft: Hackers abuse OAuth error flows to spread malware
HIGHHackers Exploit OAuth Error Flows to Spread Malware, Microsoft Warns
Fake Tech Support Spam Deploys Customized Havoc C2 Across Organizations
HIGHFake IT Support Scam Deploys Havoc C2 Framework for Cyber Attacks
Compromised Site Management Panels are a Hot Item in Cybercrime Markets
HIGHUnderground Markets Thrive on Compromised cPanel Credentials
LexisNexis confirms data breach as hackers leak stolen files
HIGHLexisNexis Data Breach Exposes Customer Information
Open-Source CyberStrikeAI Deployed in AI-Driven FortiGate Attacks Across 55 Countries
HIGHAI-Driven Attacks Exploit FortiGate Appliances in 55 Countries
Starkiller Phishing Suite Uses AitM Reverse Proxy to Bypass Multi-Factor Authentication
HIGHStarkiller Phishing Suite Evades MFA with Advanced Proxy Tactics
Amazon: Drone strikes damaged AWS data centers in Middle East
HIGHDrone Strikes Disrupt AWS Data Centers in the Middle East
Microsoft Warns OAuth Redirect Abuse Delivers Malware to Government Targets
HIGHMicrosoft Alerts on OAuth Redirect Abuse Targeting Government Sectors
SloppyLemming Targets Pakistan and Bangladesh Governments Using Dual Malware Chains
HIGHSloppyLemming Unleashes Dual Malware Chains on South Asian Governments