News


Key TakeawaysCoordinated spam attack: A massive GitHub phishing campaign utilizes repository Discussions to target developers with fraudulent software security warnings.Fake…

|
Published

Key TakeawaysOpen-source vulnerability: A severe LiteLLM malware breach infected the popular AI framework via a compromised software dependency.Credential harvesting malware:…

|
Published
Police - Hacker - Arrest - Handcuffs

Key TakeawaysSuspect apprehended: Russian authorities arrested the LeakBase admin, a prominent figure behind a major stolen credential marketplace operating since…

|
Published

Key TakeawaysArrest executed: The Gabrielle Eichert arrest addresses severe allegations of receiving and distributing sexually explicit material involving minors.Prosecution: The…

|
Published
Two men in prison

Key TakeawaysPrison sentence issued: A Russian cybercriminal was sentenced to 24 months in prison and fined $1.6 million for managing…

|
Published

Key TakeawaysRecruitment fraud: Attackers impersonate Palo Alto Networks talent acquisition staff to target senior-level professionals with highly personalized social engineering…

|
Published

Key TakeawaysUnprecedented attack surge: The 2025 Poland cyberattacks data shows 270,000 total incidents, representing a massive 2.5x increase in hostile…

|
Published

Key TakeawaysMassive scale claimed: An alleged OVHcloud data breach reportedly compromised over 1.5  million enterprise customers and almost 6 million…

|
Published

Key TakeawaysSophisticated evasion tactics: The FriendlyDealer scam utilizes PWA technology to bypass standard OS protections, funneling users toward unvetted gambling…

|
Published

Key TakeawaysMassive stablecoin exploit: A malicious actor utilized a compromised private key to illicitly mint $80 million in uncollateralized USR…

|
Published

Key TakeawaysPublic GitHub leak: The DarkSword spyware source code is now publicly accessible, allowing inexperienced hackers to easily execute severe…

|
Published

Key TakeawaysCredential compromise: A Trivy supply chain attack leveraged compromised GitHub Action tokens to execute a sophisticated open-source security breach.Malicious…

|
Published
Surfshark Introduces Privacy-Focused Location App ‘HeyPolo’

Key TakeawaysHeyPolo location-sharing app: HeyPolo location-sharing app launches with privacy-first controls allowing to share location selectively without constant trackingFlexible sharing…

|
Published
Hacker - Laptop - Data

Key TakeawaysThird-party vulnerability: An unidentified threat actor exploited a compromised employee account at an outsourcing partner to infiltrate the platform's…

|
Published
roblox

Key TakeawaysFelony charges filed: The Jamie Borne child exploitation case involves 40 felony counts for illicit digital material and one…

|
Published
School Auditorium

Key TakeawaysSuspicious activity detected: The San Felipe-Del Rio CISD outage began after administrators identified anomalous email behavior.Operational continuity maintained: Despite…

|
Published

Tina Anderson – AISLE Tina Anderson has taken on a founding GTM Account Director position at AISLE. She most recently…

|
Published

It was a week that began with thunderous momentum against one of the darkest corners of cybercrime, as global law…

|
Published on March 21, 2026

Key TakeawaysInsider threat conviction: A former data analyst was convicted of orchestrating a $2.5 million Brightly Software extortion scheme using…

|
Published on March 20, 2026

Key TakeawaysNotes targeted: The Perseus malware specifically scans note-taking applications to extract sensitive financial data and recovery phrases.Remote control: Attackers…

|
Published on March 20, 2026
For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: