Feature exploitation: Threat actors exploit the trusted M365 email pathway, designed for unauthenticated devices like printers, to bypass security checksโฆ
Coordinated attacks: At least two hacktivist groups have claimed responsibility for launching DDoS attacks against multiple high-profile Indian websites. Governmentโฆ
Mass repatriation: Cambodia repatriated 64 South Korean nationals under investigation for their alleged involvement in large-scale online scam operations. Detentionโฆ
Cyber espionage allegations: China's State Security Ministry has accused the U.S. NSA of conducting a prolonged cyberattack operation. Critical infrastructureโฆ
Coordinated attack: Hackers breached the PA systems at four airports to broadcast unauthorized messages. Third-party flaw: A cloud-based software providerโฆ
Pervasive incidents: Three-quarters of organizations experienced insider-driven data loss within the last 18 months, most incidents being unintentional. Significant impact:โฆ
For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: