Key TakeawaysTargeted Attack: Cyber espionage group UNC3886 targeted Singapore's four major telecom companies: Singtel, StarHub, M1, and Simba Telecom.Limited Exfiltration: The attackers successfully infiltrated some…
Crypto crime has moved offline as criminals are targeting people and households, not only wallets or exchanges. As digital risks seep into real lives, AI-assisted…
Key TakeawaysThird-Party Vulnerability: A security flaw in one of Flickr's third-party email service providers could have led to a data breach, exposing user information.Exposed Information:…
Key TakeawaysArrest and Charges: Aaron Corey, 23, of Albany, New York, was arrested and charged with receiving CSAM, facing up to 20 years in prison.Group…
Key TakeawaysVishing Tactic: A campaign uses deceptive emails about blocked transactions to induce victims to call a fraudulent support number, shifting the attack vector from…
Key TakeawaysSignificant Disruption: A cyberattack has taken La Sapienza University in Rome's computer systems offline for multiple days, affecting its student population.Alleged Attack: The incident…
Key TakeawaysSurge in Registrations: Security researchers identified a spike of 580 domains between December 2025 and January 2026, exploiting themes of protest, war, and sanctions…
Key TakeawaysCriminal Sentencing: Rui-Siang Lin, operator of the Incognito Market, was sentenced to 30 years in prison for narcotics distribution, money laundering, and selling misbranded…
Key TakeawaysGuilty Plea Entered: Kyle Svara, 26, admitted to federal charges, including computer fraud and aggravated identity theft for phishing access codes from nearly 600…
Key TakeawaysRapid Escalation: In 2025, the frequency of malicious email attacks more than doubled, reaching a pace of one attack every 19 seconds.Polymorphic Threats: 76%…
Key TakeawaysSocial Engineering Vector: Attackers used social engineering tactics to breach Betterment's systems, resulting in the distribution of fraudulent cryptocurrency scam messages to customers.Massive Data…
Key TakeawaysNordVPN no-logs audit: Deloitte confirms NordVPN does not collect, store, or track user browsing data.Sixth independent verification: Audit follows global ISAE standards and reviews…
Key TakeawaysGlobal Scale: Silent Push analysts identified more than 10,000 unique IP addresses infected with SystemBC malware, with the highest concentrations in the U.S., Germany,…
Key TakeawaysNew Legislation: The Spanish government will introduce legislation to ban children under 16 from accessing social media platforms.Mandatory Age Verification: A central component of…
Key TakeawaysEspionage Allegations: A 60-year-old civilian employee of Poland's Ministry of National Defense has been detained on suspicion of spying for a foreign intelligence agency.Foreign…
Key TakeawaysRecord Exposure: The ShinyHunters hacking group claims to have compromised more than 2.2 million records from Harvard University and the University of Pennsylvania.Sensitive Data…
Key TakeawaysRapid Escalation: Sysdig observed a threat actor escalate from initial access to administrative privileges in an AWS environment in under 10 minutes.AI-Driven Tactics: The…
Key TakeawaysContextual Manipulation: The DockerDash flaw enables the weaponization of image metadata, turning AI context into executable instructions for Docker's Ask Gordon AI.Dual Attack Vectors:…
Key TakeawaysEspionage Campaign: A suspected Chinese state-sponsored group selectively poisoned Notepad++ updates for six months in 2025.Malware Deployment: Attackers deployed a novel backdoor via a…
Key TakeawaysReputation Whitewashing: Civil society groups accuse NSO Group of using the Pall Mall Process to rehabilitate its image.Diplomatic Rejection: Officials clarified that NSO Group…
For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: