Security & Cyber
LIVEVulnerabilities, threat intelligence, and security advisories
ThreatsDay Bulletin: Codespaces RCE, AsyncRAT C2, BYOVD Abuse, AI Cloud Intrusions & 15+ Stories
HIGHEmerging Threats: Codespaces RCE and AI Cloud Intrusions Highlight New Attack Vectors
Newsletter platform Substack notifies users of data breach
HIGHSubstack Data Breach Exposes User Email Addresses and Phone Numbers
EU: NIS2 Update – EU Moves to Harmonise Cyber Controls, Refine Scope, and Add New In-Scope Entities
EU Proposes Amendments to NIS2 Directive for Enhanced Cybersecurity Harmonization
China: New guidance on data transfer and identification of important data in the automotive sector
China Releases New Guidance on Automotive Data Transfer
Microsoft SDL: Evolving security practices for an AI-powered world
Microsoft Enhances SDL for AI Security in a Cyberthreat Landscape
Detecting backdoored language models at scale
HIGHMicrosoft Unveils Scanner for Detecting Backdoored Language Models
DHS Holds Classified Briefing for Private Sector Election Companies
HIGHDHS Briefs Election Companies on Cyber Threats in Classified Meeting
Safeguarding and Securing Cyberspace
CISA's New Strategies for Securing Cyberspace
CRITICAL: Who Operates the Badbox 2.0 Botnet?
CRITKimwolf Botmasters Expose Badbox 2.0 Botnet Operations
Please Don’t Feed the Scattered Lapsus ShinyHunters
HIGHScattered Lapsus ShinyHunters: A New Threat in Data Ransom Tactics
Infy Hackers Resume Operations with New C2 Servers After Iran Internet Blackout Ends
HIGHInfy Hackers Evolve Tactics with New C2 Servers Post-Iran Blackout
The Buyer’s Guide to AI Usage Control
Navigating AI Usage Control in the Modern Enterprise
Showing 1-12 of 16 articles