All Articles
THIS MONTHBrowse all curated articles across categories
CRITICAL: China-Linked Red Menshen Uses Stealthy BPFDoor Implants to Spy via Telecom Networks
CRITChina-Linked Red Menshen Deploys Stealthy BPFDoor Implants in Telecom Espionage
The Ninth Circuit’s Latest CAADCA Ruling: Navigating an Evolving Compliance Landscape
Ninth Circuit's CAADCA Ruling: A New Chapter in Children's Privacy Compliance
UK sanctions Xinbi marketplace linked to Asian scam centers
HIGHUK Sanctions Target Xinbi Marketplace for Enabling Asian Scam Networks
Claude Extension Flaw Enabled Zero-Click XSS Prompt Injection via Any Website
HIGHZero-Click XSS Vulnerability Found in Claude Chrome Extension
TikTok for Business accounts targeted in new phishing campaign
HIGHPhishing Campaign Targets TikTok for Business Accounts with Advanced Evasion Techniques
Coruna iOS Kit Reuses 2023 Triangulation Exploit Code in New Mass Attacks
HIGHCoruna iOS Kit Reuses Triangulation Exploit for New Attacks
[Webinar] Stop Guessing. Learn to Validate Your Defenses Against Real Attacks
Validate Your Security Defenses Against Real-World Attacks
Suspected RedLine infostealer malware admin extradited to US
HIGHRedLine Infostealer Admin Extradited to US for Prosecution
Russia arrests suspected owner of LeakBase cybercrime forum
HIGHRussian Authorities Arrest LeakBase Cybercrime Forum Owner
Security as Code is Becoming the New Baseline: Continuous Compliance in DevOps
Embracing Security as Code: The Future of Continuous Compliance in DevOps
EU: CJEU Rules That a Single DSAR Can Be Refused as Abusive
CJEU Ruling: Single DSAR Can Be Denied as Abusive Under GDPR
WebRTC Skimmer Bypasses CSP to Steal Payment Data from E-Commerce Sites
HIGHWebRTC Skimmer Evades CSP to Steal E-Commerce Payment Data