All Articles
THIS MONTHBrowse all curated articles across categories
CRITICAL: Cisco warns of max severity Secure FMC flaws giving root access
CRITCritical Vulnerabilities in Cisco Secure FMC Demand Immediate Attention
Inside Tycoon2FA: How a leading AiTM phishing kit operated at scale
HIGHTycoon2FA: A Major Phishing Threat Disrupted by Microsoft and Europol
149 Hacktivist DDoS Attacks Hit 110 Organizations in 16 Countries After Middle East Conflict
HIGHHacktivist Surge: 149 DDoS Attacks Target 110 Organizations Amid Middle East Tensions
FBI seizes LeakBase cybercrime forum, data of 142,000 members
HIGHFBI Shuts Down LeakBase Forum, Exposes Data of 142,000 Cybercriminals
Hacker mass-mails HungerRush extortion emails to restaurant patrons
HIGHHacker Targets HungerRush POS Users with Extortion Emails
Ninth Circuit Expands Personal Jurisdiction Over Foreign Tech Platforms in Data Breach Cases
Ninth Circuit Expands Jurisdiction Over Foreign Tech in Data Breach Cases
How a Brute Force Attack Unmasked a Ransomware Infrastructure Network
HIGHBrute Force Attack Reveals Ransomware Infrastructure Network
Mississippi medical center reopens clinics hit by ransomware attack
HIGHMississippi Medical Center Recovers from Ransomware Attack
Coruna iOS Exploit Kit Uses 23 Exploits Across Five Chains Targeting iOS 13–17.2.1
HIGHCoruna Exploit Kit Targets iOS with 23 Exploits Across Five Chains
New RFP Template for AI Usage Control and AI Governance
Navigating the AI Governance Maze: New RFP Template Unveiled
Fake Laravel Packages on Packagist Deploy RAT on Windows, macOS, and Linux
HIGHMalicious Laravel Packages on Packagist Deploy Cross-Platform RAT
Unlocking Observability by Design With Inferred Schemas
Transforming Observability: The Power of Inferred Schemas