Threat Research
-
China-linked Espionage Tools Used in Ransomware Attacks
-
Analyzing DEEP#DRIVE: North Korean Threat Actors Observed Exploiting Trusted Platforms for Targeted Attacks
-
Two Tales and One Antidote – A New Mobile Malware Campaign in Poland
-
VulnLab Baby
-
Sandworm APT Attacks Detection: Russian State-Sponsored Hackers Deploy Malicious Windows KMS Activators to Target Ukraine – SOC Prime
Security News
-
China’s Salt Typhoon hackers targeting Cisco devices used by telcos, universities
-
Circuit Board Maker Unimicron Targeted in Ransomware Attack
-
Palo Alto Networks Fixes Two High-Severity PAN-OS Vulnerabilities
-
Update: PoC Exploit Published for macOS Security Flaw Enabling KASLR Bypass
-
Hackers Use CAPTCHA Trick on Webflow CDN PDFs to Bypass Security Scanners
-
An Italian journalist speaks about being targeted with Paragon spyware
-
CyberArk Expands Identity Security Play with $165M Acquisition of Zilla Security
-
North Korean APT43 Uses PowerShell and Dropbox in Targeted South Korea Cyberattacks
-
Munich Cyber Security and Security Conferences 2025 [Live Updates]
-
How Public & Private Sectors Can Better Align Cyber Defense
-
Fast Deployments, Secure Code: Watch this Learn to Sync Dev and Sec Teams
Cyber Attack & Data Breach
-
Cyberattack Disrupts Williamsburg James City County Public Schools’ IT System
-
NVIDIA Patches High-Severity Vulnerability in Jetson and IGX Orin Platforms
-
Papua New Guinea’s Internal Revenue Commission Hit by Major Cyberattack, Exposing Sensitive Data
-
Cyberattack Disrupts Services in Tulln, Austria, as City Works to Restore Access
-
German Company Eckert & Ziegler SE Responds to Cyberattack with Task Force and Minimal Impact on Production
-
Cybercrime evolving into national security threat: Google