A software supply chain attack targeting the Rust programming language ecosystem has been uncovered, involving malicious packages...
Threat Intelligence
In a significant blow to transnational cybercrime, a five-month international operation led by Interpol has resulted in...
Security analysts from Huntress Labs identified a previously unknown ransomware variant, named Obscura, in late August 2025....
A sophisticated cyberespionage campaign, attributed to suspected Chinese hackers, has been actively targeting U.S. organizations for over...
Law enforcement agencies across Europe have successfully dismantled a sophisticated cryptocurrency investment fraud ring responsible for losses...
In September 2025, the Node Package Manager (NPM) ecosystem was targeted by a series of sophisticated supply...
A new proof-of-concept tool named EDR-Freeze demonstrates a significant evolution in attacker evasion techniques. Developed by security...
The threat landscape for phishing attacks has fundamentally shifted. While email security gateways have been a primary...
President Donald Trump has confirmed that media moguls Rupert Murdoch and his son Lachlan Murdoch are part...
Fortra has issued an urgent security advisory concerning a newly identified vulnerability in its GoAnywhere Managed File...
Microsoft 365’s position as the dominant enterprise productivity suite has made it the single biggest risk in...
The Python Software Foundation has confirmed the invalidation of all PyPI tokens compromised during the GhostAction supply...
Two teenagers have been formally charged in connection with a significant cyber attack against Transport for London...
A coordinated legal and technical operation by Microsoft and Cloudflare has successfully disrupted RaccoonO365, one of the...
A significant Android ad fraud campaign known as “SlopAds” has been disrupted following the removal of 224...
The assassination of political commentator Charlie Kirk on September 10, 2025, has ignited a complex crisis extending...
The modern web browser has become the primary interface for enterprise work, hosting sensitive data, credentials, and...
Google has confirmed that threat actors successfully created a fraudulent account within its Law Enforcement Request System...
A series of multibillion-dollar transactions between the Trump administration, its allies, and the United Arab Emirates have...
The cybersecurity industry is confronting a fundamental shift in how vulnerabilities are managed. The traditional model, centered...