Spike in phishing: Recent reports indicate that campaigns targeting financial brands account for approximately a third of all phishing activity. Fake websites: Attackers exploit users'…
New TTPs: Scattered Spider displays more sophisticated social engineering techniques, reportedly adding a DragonForce ransomware variant. Additional approaches: The update refers to the threat actor…
What happened: The Neopharm and Stolichki pharmacy chains in Russia were targeted by cyberattacks. Impact: Over 1,100 pharmacy locations in more than 80 cities across…
What happened: Attackers tried to breach the U.S. Fermilab, exploiting a vulnerability in Microsoft SharePoint. Attack impact: Critical data, including classified or sensitive information, was…
Improved malware: A new email phishing campaign with a multi-stage infection chain revealed a sophisticated threat, Obj3ctivity Stealer. Malware capabilities: The stealer includes a full…
What happened: New information revealed that the Allianz Life data breach occurred due to social engineering targeting a CRM service. Exposed data: Sensitive information, including…
First time: This is the first known use of Auto-Color via the SAP NetWeaver flaw, employing a new suppression technique. Targeting U.S. chemicals: A chemical…
Another compromise: A second Tea app exposure has come to light, involving an unprotected database that included user messages. Impact: A service marketed as safe…
What happened: Elon Musk’s Starlink internet service suffered an outage that even impacted the Ukrainian front. Speculations: Experts believe several reasons may be at the…
Meta copyright lawsuit: Two adult film producers, Strike 3 Holdings and Counterlife Media, accuse Meta of training AI on pirated pornographic videos. New accusations: The…
Teen deepfakes probe: A student in Valencia is suspected of creating deepfake nude images of female classmates for selling them. Victim scope: Sixteen girls complained…
Data breach: A significant cybersecurity incident involved the leak of user images from posts, comments, and direct messages. Tea acknowledgement: The women-dedicated app confirmed identifying…
BreachForums is reportedly back online under original admins, with all user data preserved They attribute the April outage to a patched MyBB software vulnerability The…
VPN Searches Surge: UK VPN searches spike 700% after porn sites require strict age verification checks. New Age-Check Rules: Under the Online Safety Act, adult…
New threat actor: A novel RaaS operation capitalizes on the Chaos name association with popular ransomware builder tool variants. TTPs overlap: Security researchers say Chaos…
Breach details: A significant, unprotected database exposed sensitive user information, primarily associated with the Leak Zone cybercrime forum. Database content: Each entry consisted of a…
BEC scam: Fake Microsoft 365 login pages harvested credentials and finance-related emails from aviation executives. Scheme details: Hackers edited official invoices they accessed and sent…
DPRK-linked operation: An Arizona resident helped North Koreans pretend to be U.S.-based remote IT workers to trick 300 American companies. Charges: She pleaded guilty to…
Hardware-Enforced Privacy: In VP.Net, traffic is decrypted inside SGX enclaves, inaccessible even to server administrators. No Linkable Logs: Enclave obfuscates, batches, and mixes data to…
Quantum Ready: Windscribe prepares to add post-quantum encryption to VPN protocols Gradual Rollout: High-risk connections get early access to hybrid key exchange Standards Aligned: New…
For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: