Key TakeawaysEspionage Campaign: A suspected Chinese state-sponsored group selectively poisoned Notepad++ updates for six months in 2025.Malware Deployment: Attackers deployed…
Key TakeawaysReputation Whitewashing: Civil society groups accuse NSO Group of using the Pall Mall Process to rehabilitate its image.Diplomatic Rejection:…
John Landry – SyncraSys John Landry has joined SyncraSys as chief operating officer, taking responsibility for operational readiness and organizational…
Key TakeawaysGovernment Target: A Ministerio de Ciencia, Innovación y Universidades breach was claimed on a hacking forum.Flaw Exploitation: The actor…
Key TakeawaysTargeted Lure: Weaponized Excel files disguised as lists of protesters killed during the Dey 1404 protests target investigators documenting…
Key TakeawaysRegistry Infiltration: Threat actors successfully compromised a developer account on the Open VSX registry to publish malicious updates.Malware Deployment:…
Key TakeawaysSocial Engineering: Threat actors are leveraging vishing and victim-branded credential harvesting sites to compromise SSO credentials and MFA codes.Targeted…
Key TakeawaysSignificant Degradation: Google's Threat Intelligence Group reduced the IPIDEA network's available devices by millions, used by over 550 distinct…
Key TakeawaysZero-Day Discovery: Security researchers have identified two critical RCE flaws in Ivanti Endpoint Manager Mobile (EPMM) that are currently…
Key TakeawaysVendor Compromise: Fintech firm Marquis attributes its recent data breach to a compromised SonicWall-managed firewall configuration.Ransomware Impact: The attack…
Key TakeawaysThree groups: Activity linked to LABYRINTH CHOLLIMA now maps to three distinct adversaries.Focus: Two groups prioritize cryptocurrency revenue, while…
Key TakeawaysCyberGhost server misuse: BiuBiu VPN Chrome extension hijacked free servers; 20 million users affected; no data breached.Security discovery: Researchers…
Key TakeawaysSurfshark infrastructure security audit: Independent SecuRing audit found no critical flaws and confirmed strong protection against real-world cyber threats.Real-world…
For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: