Recent

Key TakeawaysOpen-source vulnerability: A severe LiteLLM malware breach infected the popular AI framework via a compromised software dependency.Credential harvesting malware: The malicious payload actively exfiltrated…

|
Published
Police - Hacker - Arrest - Handcuffs

Key TakeawaysSuspect apprehended: Russian authorities arrested the LeakBase admin, a prominent figure behind a major stolen credential marketplace operating since 2021.Cybercrime forum disrupted: Law enforcement…

|
Published

Key TakeawaysArrest executed: The Gabrielle Eichert arrest addresses severe allegations of receiving and distributing sexually explicit material involving minors.Prosecution: The Southern District of New York…

|
Published
Two men in prison

Key TakeawaysPrison sentence issued: A Russian cybercriminal was sentenced to 24 months in prison and fined $1.6 million for managing a massive malicious botnet.Botnet ransomware…

|
Published

Key TakeawaysRecruitment fraud: Attackers impersonate Palo Alto Networks talent acquisition staff to target senior-level professionals with highly personalized social engineering tactics.Manufactured crisis: The phishing campaign…

|
Published

Key TakeawaysUnprecedented attack surge: The 2025 Poland cyberattacks data shows 270,000 total incidents, representing a massive 2.5x increase in hostile network activity.Energy sector breach: A…

|
Published

Key TakeawaysMassive scale claimed: An alleged OVHcloud data breach reportedly compromised over 1.5  million enterprise customers and almost 6 million active hosted websites.Extensive data exfiltration:…

|
Published

Key TakeawaysSophisticated evasion tactics: The FriendlyDealer scam utilizes PWA technology to bypass standard OS protections, funneling users toward unvetted gambling apps.Massive infrastructure scale: Security analysts…

|
Published on March 24, 2026

Key TakeawaysMassive stablecoin exploit: A malicious actor utilized a compromised private key to illicitly mint $80 million in uncollateralized USR tokens.Market value collapse: Following the…

|
Published on March 24, 2026

Key TakeawaysPublic GitHub leak: The DarkSword spyware source code is now publicly accessible, allowing inexperienced hackers to easily execute severe iOS vulnerabilities.Massive cybersecurity threat: The…

|
Published on March 24, 2026

Key TakeawaysCredential compromise: A Trivy supply chain attack leveraged compromised GitHub Action tokens to execute a sophisticated open-source security breach.Malicious release: Threat actors modified existing…

|
Published on March 24, 2026
Surfshark Introduces Privacy-Focused Location App ‘HeyPolo’

Key TakeawaysHeyPolo location-sharing app: HeyPolo location-sharing app launches with privacy-first controls allowing to share location selectively without constant trackingFlexible sharing features: App supports unlimited groups…

|
Published on March 24, 2026
Hacker - Laptop - Data

Key TakeawaysThird-party vulnerability: An unidentified threat actor exploited a compromised employee account at an outsourcing partner to infiltrate the platform's infrastructure.Substantial data exfiltration: The unauthorized…

|
Published on March 23, 2026
roblox

Key TakeawaysFelony charges filed: The Jamie Borne child exploitation case involves 40 felony counts for illicit digital material and one count for physical contraband.Digital evidence…

|
Published on March 23, 2026
School Auditorium

Key TakeawaysSuspicious activity detected: The San Felipe-Del Rio CISD outage began after administrators identified anomalous email behavior.Operational continuity maintained: Despite the Texas school district cyber…

|
Published on March 23, 2026

Tina Anderson – AISLE Tina Anderson has taken on a founding GTM Account Director position at AISLE. She most recently worked as an Account Director…

|
Published on March 23, 2026

It was a week that began with thunderous momentum against one of the darkest corners of cybercrime, as global law enforcement delivered a major blow…

|
Published on March 21, 2026

Key TakeawaysInsider threat conviction: A former data analyst was convicted of orchestrating a $2.5 million Brightly Software extortion scheme using stolen corporate data.Stolen corporate data:…

|
Published on March 20, 2026

Key TakeawaysNotes targeted: The Perseus malware specifically scans note-taking applications to extract sensitive financial data and recovery phrases.Remote control: Attackers achieve full Android device takeover…

|
Published on March 20, 2026

Key TakeawaysInfrastructure dismantled: Four Handala hacking group websites used for cyber extortion and doxing were taken down.Destructive network breach: The cybersecurity operation follows Handala's recent…

|
Published on March 20, 2026
For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: