News


Key TakeawaysSophisticated evasion tactics: The FriendlyDealer scam utilizes PWA technology to bypass standard OS protections, funneling users toward unvetted gambling…

|
Published

Key TakeawaysMassive stablecoin exploit: A malicious actor utilized a compromised private key to illicitly mint $80 million in uncollateralized USR…

|
Published

Key TakeawaysPublic GitHub leak: The DarkSword spyware source code is now publicly accessible, allowing inexperienced hackers to easily execute severe…

|
Published

Key TakeawaysCredential compromise: A Trivy supply chain attack leveraged compromised GitHub Action tokens to execute a sophisticated open-source security breach.Malicious…

|
Published
Surfshark Introduces Privacy-Focused Location App ‘HeyPolo’

Key TakeawaysHeyPolo location-sharing app: HeyPolo location-sharing app launches with privacy-first controls allowing to share location selectively without constant trackingFlexible sharing…

|
Published
Hacker - Laptop - Data

Key TakeawaysThird-party vulnerability: An unidentified threat actor exploited a compromised employee account at an outsourcing partner to infiltrate the platform's…

|
Published
roblox

Key TakeawaysFelony charges filed: The Jamie Borne child exploitation case involves 40 felony counts for illicit digital material and one…

|
Published
School Auditorium

Key TakeawaysSuspicious activity detected: The San Felipe-Del Rio CISD outage began after administrators identified anomalous email behavior.Operational continuity maintained: Despite…

|
Published

Tina Anderson – AISLE Tina Anderson has taken on a founding GTM Account Director position at AISLE. She most recently…

|
Published

It was a week that began with thunderous momentum against one of the darkest corners of cybercrime, as global law…

|
Published

Key TakeawaysInsider threat conviction: A former data analyst was convicted of orchestrating a $2.5 million Brightly Software extortion scheme using…

|
Published on March 20, 2026

Key TakeawaysNotes targeted: The Perseus malware specifically scans note-taking applications to extract sensitive financial data and recovery phrases.Remote control: Attackers…

|
Published on March 20, 2026

Key TakeawaysInfrastructure dismantled: Four Handala hacking group websites used for cyber extortion and doxing were taken down.Destructive network breach: The…

|
Published on March 20, 2026

Key TakeawaysServices paused: A ransomware attack in Foster City forced officials to halt non-emergency municipal operations, causing widespread disruption to…

|
Published on March 20, 2026

Key TakeawaysGlobal infrastructure: A coordinated international task force took down four malicious networks that infected more than three million devices…

|
Published on March 20, 2026
Healthcare industry, a target for cyberattackers

Key TakeawaysCISA security directive: The agency urged organizations to harden Microsoft Intune security to mitigate critical endpoint management vulnerabilities.Business operations…

|
Published on March 19, 2026
mobile hacker

Key TakeawaysExploit chain exposed: The Darksword exploit kit leverages six recently patched iPhone vulnerabilities to deploy sophisticated malware on targeted…

|
Published on March 19, 2026

Key TakeawaysContent referral operation: Investigators systematically identified and flagged 17,298 URLs containing terrorist audio propaganda across 40 websites during the…

|
Published on March 19, 2026

Key TakeawaysZero-day exploitation: The Interlock ransomware campaign exploited the critical CVE-2026-20131 vulnerability weeks before public disclosure to compromise enterprise networks.Root…

|
Published on March 19, 2026

Key TakeawaysExploit Chain Discovered: Researchers identified Claude.ai vulnerabilities that combine AI prompt injection, open redirects, and API flaws into a…

|
Published on March 18, 2026
For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: