radar

ONE Sentinel

article

All Articles

ALL TIME

Browse all curated articles across categories

372 articles
security

Starbucks discloses data breach affecting hundreds of employees

HIGH

Starbucks Data Breach Exposes Employee Accounts

Bleeping ComputerTHREATS17d
security

Authorities Disrupt SocksEscort Proxy Botnet Exploiting 369,000 IPs Across 163 Countries

HIGH

Global Crackdown on SocksEscort Botnet Targeting 369,000 IPs

The Hacker NewsTHREATS17d
security

Google fixes two new Chrome zero-days exploited in attacks

HIGH

Google Urgently Patches Two Zero-Day Vulnerabilities in Chrome

Bleeping ComputerTHREATS17d
security

AI-generated Slopoly malware used in Interlock ransomware attack

HIGH

AI-Generated Slopoly Malware Fuels Interlock Ransomware Attack

Bleeping ComputerTHREATS17d
security

England Hockey investigating ransomware data breach

HIGH

England Hockey Faces Ransomware Data Breach Investigation

Bleeping ComputerTHREATS17d
security

Storm-2561 uses SEO poisoning to distribute fake VPN clients for credential theft

HIGH

Storm-2561 Exploits SEO to Spread Fake VPN Clients and Steal Credentials

Microsoft Security BlogM36517d
security

Hive0163 Uses AI-Assisted Slopoly Malware for Persistent Access in Ransomware Attacks

HIGH

Hive0163 Leverages AI-Driven Slopoly Malware for Advanced Ransomware Tactics

The Hacker NewsTHREATS17d
security

Rust-Based VENON Malware Targets 33 Brazilian Banks with Credential-Stealing Overlays

HIGH

Rust-Based VENON Malware Targets Brazilian Banks with Credential Theft

The Hacker NewsTHREATS17d
security

US disrupts SocksEscort proxy network powered by Linux malware

HIGH

US and European Agencies Dismantle SocksEscort Proxy Network Exploiting Linux Malware

Bleeping ComputerTHREATS17d
security

ThreatsDay Bulletin: OAuth Trap, EDR Killer, Signal Phishing, Zombie ZIP, AI Platform Hack & More

HIGH

Weekly Security Bulletin Highlights Emerging Threats and Old Tricks

The Hacker NewsTHREATS17d
security

How to Scale Phishing Detection in Your SOC: 3 Steps for CISOs

HIGH

Scaling Phishing Detection: A Strategic Guide for CISOs

The Hacker NewsTHREATS17d
security

Going the Extra Mile: Travel Rewards Turn into Underground Currency.

HIGH

Stolen Airline Miles Fuel Underground Market as Tradable Currency

Bleeping ComputerTHREATS17d