News


Key TakeawaysSilent data breach: A newly observed Grafana vulnerability enables automatic, undetected data exfiltration without requiring user interaction or administrative…

|
Published

Key TakeawaysRansomware extortion threat: The Russian-speaking Qilin ransomware group claimed the Die Linke cyberattack, threatening to publish stolen internal data…

|
Published

Key TakeawaysMajor banks hit: A massive Russian banking outage disabled mobile applications, ATMs, and public transit payment systems across multiple…

|
Published

Key TakeawaysRapid attack execution: The Medusa ransomware group transitions from initial network access to data exfiltration and payload deployment within…

|
Published

Key TakeawaysBlueHammer zero-day exploit: A disgruntled researcher publicly released code for an unpatched Windows privilege escalation vulnerability, granting attackers elevated…

|
Published

Key TakeawaysDrift hack execution: A highly sophisticated $28.5 million cryptocurrency theft compromised operational contributors and cloud assets following a prolonged…

|
Published

Key TakeawaysAlleged leader identified: German authorities unmasked Daniil Maksimovich Shchukin as "UNKN," the alleged mastermind behind the REvil and GandCrab…

|
Published

Key TakeawaysFraudulent notices: Threat actors deploy SMS-based social engineering campaigns impersonating state judicial systems, alleging outstanding traffic violations requiring immediate…

|
Published

Hagit Ynon – Pentera Hagit Ynon has been named Chief Financial Officer at Pentera, joining the cybersecurity company as it…

|
Published

This week’s cybersecurity activity shows a clear focus on gaining access and visibility inside systems, with supply chain attacks, credential…

|
Published

Key TakeawaysGuilty plea: A 59-year-old Missouri man entered a guilty plea for executing an internal network compromise and subsequent extortion…

|
Published on April 3, 2026

Key TakeawaysSocial engineering: Hackers breached the Hims & Hers third-party ticketing system via social engineering tactics between February 4 and…

|
Published on April 3, 2026

Key TakeawaysDuc App breach: A massive data leak exposed over 360,000 unencrypted files containing sensitive customer information from the Duales…

|
Published on April 3, 2026

Key TakeawaysLNK file attacks: Recent Democratic People's Republic of Korea (DPRK) cyber campaigns utilize malicious LNK files containing encoded PowerShell…

|
Published on April 2, 2026

Key TakeawaysiOS 18.7.7 update: Apple deployed emergency patches for older iPhones and iPads to neutralize critical vulnerabilities tied to a…

|
Published on April 2, 2026

Key TakeawaysAlleged breach impact: Cisco faces intense scrutiny following reports of a significant internal network intrusion that may have exposed…

|
Published on April 2, 2026

Key TakeawaysLi Xiong extradition: Cambodian authorities transferred the former Huione Group chairman to China on charges of alleged leadership of…

|
Published on April 2, 2026

Key TakeawaysFake app: WhatsApp alerted approximately 200 users, primarily located in Italy, about downloading a malicious iOS application disguised as…

|
Published on April 2, 2026

Key TakeawaysAttribution confirmed: Google Threat Intelligence Group attributes the Axios supply chain attack to North Korea-linked hackers, specifically the threat…

|
Published on April 1, 2026

Key TakeawaysSyndicate scale exposed: Strike Force Carieville uncovered a dark net drug syndicate that facilitated an $80 million drug supply…

|
Published on April 1, 2026
For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: