Recent

Key TakeawaysExploit Proliferation: A sophisticated suite of hacking tools designed to compromise iPhones has been leaked and is now actively used by cybercriminals.Broad Impact: The…

|
Published
Man holding an envelope targeted by a fishing hook, depicting phishing attack

Key TakeawaysExploited Authorization Flows: Threat actors are manipulating OAuth redirect URIs to route authenticated users to malicious infrastructure undetected.Sophisticated Payloads: The campaign deploys embedded ZIP…

|
Published

Key TakeawaysNetwork Disruption: The Denmark School District experienced a prolonged internet outage stemming from an alleged internal vulnerability.Operational Impact: The lack of connectivity forced educators…

|
Published

Key TakeawaysDigital Strikes: Critical Iranian communication and sensor frameworks were disabled in a coordinated operation by the U.S. Cyber Command.Tactical Foundation: These non-kinetic cyber actions…

|
Published

Key TakeawaysPrison Sentence: A Bavarian court sentenced the central figure of the Milton Group scam network to more than 7 years in prison for financial…

|
Published

Key TakeawaysRegulatory Deadline: Starting March 9, AI services in Australia must restrict access to harmful content for users under 18 or pay millions in penalties.Gatekeeper…

|
Published

Key TakeawaysAI-Powered Breach: Threat actors leveraged Anthropic's Claude Code and OpenAI's GPT-4.1 to execute a multi-stage attack against Mexican government entities.Massive Data Exfiltration: The breach…

|
Published

Key TakeawaysCompromised Application: The 'BadeSaba' prayer app was hacked to broadcast "surrender" notifications to millions of Iranians during airstrikes.Psychological Operations: Messages promised amnesty to military…

|
Published

Key TakeawaysOperational Failure: The National Tax Service inadvertently published a seed phrase in press materials, compromising a seized wallet.Asset Theft: Unauthorized actors exploited the leak…

|
Published
Cyber Job Moves March 02 - 2026

Nick Andersen – CISA The Cybersecurity and Infrastructure Security Agency (CISA) has named Nick Andersen as Interim Director following the departure of Madhu Gottumukkala from…

|
Published

Arrests, indictments, and convictions maintained continued pressure on ransomware, fraud networks, and insider threats, with criminal activity moving laterally across airlines, energy, healthcare, and education…

|
Published on February 28, 2026
Telecom Tower - Server - Data

Key TakeawaysMassive Data Exposure: A significant data breach at the Dutch telecom provider Odido in February 2026 exposed millions of customer records.Attribution and Extortion: The…

|
Published on February 27, 2026
Skull formed by binary code in a red background with floating binary code

Key TakeawaysSector Targeting: The threat actor UAT-10027 is actively targeting the U.S. education and healthcare sectors using sophisticated malware.Malware Deployment: The campaign utilizes a custom…

|
Published on February 27, 2026
Europol building

Key TakeawaysInternational Collaboration: Project Compass unites law enforcement from 28 countries, including EU Member States and international partners like the US, UK, Canada, and Australia.Significant…

|
Published on February 27, 2026
Man behind bars with handcuffs

Key TakeawaysKey Convictions: Intellexa founder Tal Dilian and three associates have been sentenced by a Greek court for their roles in the Predator spyware scandal.Significant…

|
Published on February 27, 2026
CISCO

Key TakeawaysCritical Alert Issued: Intelligence agencies from the Five Eyes alliance have warned that advanced threat actors are actively exploiting vulnerabilities in Cisco SD-WAN systems.Targeted…

|
Published on February 26, 2026
Control Room - Screens - Worl Map - Hackers - Personnel

Key TakeawaysSuspect Charged: A Moscow resident, Ruslan Satuchin, has been formally charged with attempting to extort the Conti ransomware gang.Alleged Impersonation: Satuchin is accused of…

|
Published on February 26, 2026

Key TakeawaysClaude Vulnerabilities: Researchers discovered flaws in Anthropic's Claude Code (CVE-2025-59536, CVE-2026-21852) that permitted remote code execution and API token theft.Attack Vector: The vulnerabilities exploited…

|
Published on February 26, 2026
Hacker - Laptop

Key TakeawaysTactical Shift: The Scattered Lapsus$ Hunters cybercrime group is actively recruiting women on public channels to conduct voice phishing attacks.High Incentives: Recruits are offered…

|
Published on February 26, 2026
Windscribe Launches New App Update to Restore VPN Access in Iran and Russia

Key TakeawaysWindscribe new app update rollout: New apps add AmneziaWG and WireGuard options helping users bypass blocks in Iran Russia.Stealth protocol integration benefits: AmneziaWG masks…

|
Published on February 26, 2026
For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: