radar

ONE Sentinel

security

Security & Cyber

LIVE

Vulnerabilities, threat intelligence, and security advisories

1166 articles
|
security

Italian university La Sapienza goes offline after cyberattack

HIGH

Cyberattack Disrupts Operations at Rome's La Sapienza University

Bleeping ComputerTHREATS3 months
security

Microsoft to shut down Exchange Online EWS in April 2027

Microsoft to Sunset Exchange Online EWS API by April 2027

Bleeping ComputerTHREATS3 months
security

When cloud logs fall short, the network tells the truth

Network Telemetry: The Reliable Alternative to Incomplete Cloud Logs

Bleeping ComputerTHREATS3 months
security

Romanian oil pipeline operator Conpet discloses cyberattack

HIGH

Cyberattack Hits Romanian Oil Pipeline Operator Conpet

Bleeping ComputerTHREATS3 months
security

ThreatsDay Bulletin: Codespaces RCE, AsyncRAT C2, BYOVD Abuse, AI Cloud Intrusions & 15+ Stories

HIGH

Emerging Threats: Codespaces RCE and AI Cloud Intrusions Highlight New Attack Vectors

The Hacker NewsTHREATS3 months
security

Newsletter platform Substack notifies users of data breach

HIGH

Substack Data Breach Exposes User Email Addresses and Phone Numbers

Bleeping ComputerTHREATS3 months
security

DHS Holds Classified Briefing for Private Sector Election Companies

HIGH

DHS Briefs Election Companies on Cyber Threats in Classified Meeting

CISATHREATSover 7 years
security

Safeguarding and Securing Cyberspace

CISA's New Strategies for Securing Cyberspace

CISATHREATSalmost 15 years
security

CRITICAL: Who Operates the Badbox 2.0 Botnet?

CRIT

Kimwolf Botmasters Expose Badbox 2.0 Botnet Operations

Krebs on SecurityTHREATS4 months
security

Please Don’t Feed the Scattered Lapsus ShinyHunters

HIGH

Scattered Lapsus ShinyHunters: A New Threat in Data Ransom Tactics

Krebs on SecurityTHREATS3 months
security

Infy Hackers Resume Operations with New C2 Servers After Iran Internet Blackout Ends

HIGH

Infy Hackers Evolve Tactics with New C2 Servers Post-Iran Blackout

The Hacker NewsTHREATS3 months
security

The Buyer’s Guide to AI Usage Control

Navigating AI Usage Control in the Modern Enterprise

The Hacker NewsTHREATS3 months

Showing 1153-1164 of 1166 articles