News


Prolonged access: Salt Typhoon gained extensive access to the National Guard’s internal network for nearly a year. Extended compromise: The…

|
Published on July 17, 2025

Cryptocurrency theft: Octalyn Stealer aggressively targets cryptocurrency wallets like Bitcoin, Ethereum, Litecoin, and Monero. VPNs targeted: It captures VPN configuration…

|
Published on July 17, 2025

Operation Eastwood: Global authorities have taken down over 100 servers used for DDoS attacks on various entities. Why it matters:…

|
Published on July 17, 2025
Encryption at Risk Experts Sound Alarm Over EU's New Data Access Plan

EU’s 2030 roadmap proposes lawful access to encrypted data for law enforcement agencies. Experts concern for EU's plan shows how…

|
Published on July 17, 2025

A Blocking First: Cloudflare is the first anti-piracy internet intermediary beyond ISPs to block pirate sites. Legal Reasons: A legal…

|
Published on July 16, 2025

What Happened: Cameron John Wagenius pleaded guilty to extra charges in an ongoing lawsuit, including ransomware extortion. Fraud Conspiracy: DOJ…

|
Published on July 16, 2025

What Happened: The Ukrainian BO Team claimed a successful Gaskar Group network and server infrastructure breach. Assets Impacted: The attackers…

|
Published on July 16, 2025

An Australian-Russian national, Simeon Boikov, was sanctioned for disseminating false information on critical topics. The individual spread misinformation targeting the…

|
Published on July 16, 2025

Phishing campaigns are leveraging a sophisticated method called SVG smuggling. Attackers exploit SVGs by disguising malicious JavaScript code as part…

|
Published on July 15, 2025

Attackers utilize advanced phishing to exploit trust in software downloads from familiar-looking websites. Security researchers flagged over 600 domains linked…

|
Published on July 15, 2025

A government employee with ties to DOGE was the source of another API key data breach. Marko Elez leaked a…

|
Published on July 15, 2025

DragonForce listed U.S. department store chain Belk as its latest victim. The attackers reportedly accessed and exfiltrated confidential information. Belk…

|
Published on July 15, 2025

A Google Gemini for Workspace prompt-injection vulnerability that allows for hidden prompts. Attackers use a known technique – zero font…

|
Published on July 14, 2025

Stormous Ransomware published samples from an alleged data breach targeting North Country HealthCare. The threat actor intends to sell 500,000…

|
Published on July 14, 2025

Numerous industries are targeted in a KongTuke campaign that transitions to a FileFix variant. Attackers employ fake CAPTCHA verifications to…

|
Published on July 14, 2025

Doxing of Immigration and Customs Enforcement (ICE) officers has surged, particularly in Portland. This is attributed to Antifa-affiliated groups like…

|
Published on July 12, 2025

The macOS.ZuRu malware resurfaced, hiding in the popular SSH client and server-management Termius app. The novel variant uses the open-source…

|
Published on July 11, 2025
Pirate logo (skull and crossbones)

NSW2U and several other prominent domains harboring pirated games were taken down in an FBI operation. These platforms were notorious…

|
Published on July 11, 2025

Russian basketball player Daniil Kasatkin was detained in France at the request of the U.S. authorities. Kasatkin stands accused of…

|
Published on July 11, 2025

Authorities in the U.K. charged two young individuals for alleged links to the notorious Scattered Spider ransomware gang. One of…

|
Published on July 11, 2025
For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: