Key TakeawaysThird-Party Breach: A data breach at HR outsourcing firm Conduent exposed the personal information of nearly 17,000 employees of Volvo Group North America.Prolonged Access:…
Key TakeawaysCurrent Tactic: North Korean operatives are using verified LinkedIn profiles to impersonate professionals and establish trust with targets.Possible Goal: The primary objective for such…
Key TakeawaysAI-Driven Development: Darktrace researchers identified a fully AI-generated malware strain exploiting the React2Shell vulnerability, demonstrating how LLMs lower the barrier for effective cyberattacks.Targeted Infrastructure:…
Key TakeawaysSystem Disruption: A cybersecurity incident forced the temporary suspension of operations at Senegal's Directorate of File Automation (DAF), the agency managing national ID cards…
Key TakeawaysCritical Flaws Exposed: Two zero-day vulnerabilities (CVE-2026-1281 and CVE-2026-1340) in Ivanti Endpoint Manager Mobile (EPMM) allow attackers to hijack devices without authentication.Government Systems Hacked:…
Key TakeawaysMassive Data Exposure: A hacktivist scraped and published the payment records of over half a million customers of consumer-grade stalkerware apps.Vulnerability Exploited: The data…
Key TakeawaysDatabase Sale: Threat actor "quellostanco" claims to be selling a database of approximately 104,000 records allegedly stolen from EgyptAir on a cybercrime forum.Compromised Data:…
Key TakeawaysTargeted Attack: Cyber espionage group UNC3886 targeted Singapore's four major telecom companies: Singtel, StarHub, M1, and Simba Telecom.Limited Exfiltration: The attackers successfully infiltrated some…
Crypto crime has moved offline as criminals are targeting people and households, not only wallets or exchanges. As digital risks seep into real lives, AI-assisted…
Key TakeawaysThird-Party Vulnerability: A security flaw in one of Flickr's third-party email service providers could have led to a data breach, exposing user information.Exposed Information:…
Key TakeawaysArrest and Charges: Aaron Corey, 23, of Albany, New York, was arrested and charged with receiving CSAM, facing up to 20 years in prison.Group…
Key TakeawaysVishing Tactic: A campaign uses deceptive emails about blocked transactions to induce victims to call a fraudulent support number, shifting the attack vector from…
Key TakeawaysSignificant Disruption: A cyberattack has taken La Sapienza University in Rome's computer systems offline for multiple days, affecting its student population.Alleged Attack: The incident…
Key TakeawaysSurge in Registrations: Security researchers identified a spike of 580 domains between December 2025 and January 2026, exploiting themes of protest, war, and sanctions…
Key TakeawaysCriminal Sentencing: Rui-Siang Lin, operator of the Incognito Market, was sentenced to 30 years in prison for narcotics distribution, money laundering, and selling misbranded…
Key TakeawaysGuilty Plea Entered: Kyle Svara, 26, admitted to federal charges, including computer fraud and aggravated identity theft for phishing access codes from nearly 600…
Key TakeawaysRapid Escalation: In 2025, the frequency of malicious email attacks more than doubled, reaching a pace of one attack every 19 seconds.Polymorphic Threats: 76%…
Key TakeawaysSocial Engineering Vector: Attackers used social engineering tactics to breach Betterment's systems, resulting in the distribution of fraudulent cryptocurrency scam messages to customers.Massive Data…
For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: