Lovesac, a prominent American furniture retailer, has confirmed a significant data breach following claims of a ransomware...
Threat Intelligence
In a significant one-two punch against the digital piracy ecosystem, international anti-piracy coalition ACE (Alliance for Creativity...
A sophisticated phishing campaign is leveraging Apple’s iCloud Calendar service to distribute fraudulent purchase notifications directly from...
A sophisticated supply chain attack, dubbed “s1ngularity,” has resulted in the compromise of 2,180 GitHub accounts and...
A new legislative framework in Hong Kong is creating conditions for the potential development of state-controlled digital...
The digital landscape for healthcare fraud is undergoing a rapid and dangerous evolution. Scammers are now using...
A critical zero-day vulnerability in legacy Sitecore deployments, designated CVE-2025-53690, has been actively exploited by threat actors...
Chess.com, a leading online chess platform with over 150 million registered users, has disclosed a data breach...
The browser has become the primary attack surface for modern cyber operations, shifting the frontline of defense...
A new technique, dubbed “Grokking,” is being used by threat actors to bypass X’s link-posting restrictions, leveraging...
The U.S. Department of State has announced a reward of up to $10 million for information leading...
The U.S. Department of Justice, on behalf of the Federal Trade Commission (FTC), has filed a lawsuit...
The weaponization of geolocation data represents one of the most significant shifts in offensive cyber operations, transforming...
A sophisticated cyberattack attributed to Russian state-sponsored actors breached the U.S. federal judiciary’s critical Case Management/Electronic Case...
A coordinated wave of swatting attacks has disrupted college campuses across the United States at the start...
Amazon’s threat intelligence team has successfully identified and disrupted a sophisticated watering hole campaign in June 2025,...
A coordinated international operation between the FBI and the Dutch Police has resulted in the seizure of...
The pervasive use of unauthorized hardware, software, and cloud services, collectively known as Shadow IT, presents a...
A new report from AI startup Anthropic details what appears to be the first documented, large-scale cybercriminal...
Threat researchers from ESET have identified a novel ransomware strain, designated PromptLock, which represents a significant shift...