Key TakeawaysRansom paid: Instructure compensated the ShinyHunters cybercriminal group following the Canvas data theft.Data compromised: Hackers claimed to steal records…
Key TakeawaysWidespread breaches: Over 70% of surveyed organizations experienced at least one identity-related breach in the past 12 months.Ransomware pipeline:…
Key TakeawaysE-comm infrastructure compromised: Skoda Auto confirmed a cybersecurity incident affecting its online retail platform.Customer data exfiltration: Threat actors possibly…
Key TakeawaysAttack volumes decrease: The share of organizations affected by ransomware decreased globally in 2025.Evasion tactics escalate: Attackers increasingly deploy…
Key TakeawaysRogue plugin: A malicious version of the Checkmarx Jenkins AST plugin was published on the Jenkins Marketplace.TeamPCP claims responsibility:…
Key TakeawaysZero-day discovery: GTIG identified a criminal actor utilizing an AI-developed zero-day exploit for the first time.Exploitation event prevented: Proactive…
Key TakeawaysRansomware incident: Italian jewelry manufacturer Unoaerre confirmed it suffered a confirmed cyberattack on May 10, 2026.Operations temporarily halted: Management…
Key TakeawaysDatabase deletion incident: Following employment termination, two brothers unlawfully deleted approximately 96 federal government databases.Federal jury conviction: Sohaib Akhter…
Key TakeawaysCloud credential theft: SentinelLABS identified PCPJack, a framework that worms across cloud infrastructure and removes TeamPCP artifacts.No cryptominers deployed:…
Key TakeawaysThreat actor claims: The RansomHouse hacking group claimed responsibility for the cyberattack targeting the Trellix cybersecurity firm.Incident status confirmed:…
Key TakeawaysCompromised user data: HIBP said the breach impacted 447,600 Woflow accounts, exposing email addresses, names, phone numbers, and physical…
Key TakeawaysMalicious NuGet packages: Five compromised packages impersonating Chinese .NET libraries under the publisher account bmrxntfj.Extensive data theft: The .NET…
Key TakeawaysActive exploitation: The CopyFail bug is actively exploited and has been added to CISA's Known Exploited Vulnerabilities (KEV) catalog.Broad…
For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: