Recent
Fortinet

Key TakeawaysActive Exploitation: Attackers abused FortiCloud SSO trust to access unrelated customer devices using valid FortiCloud accounts.Emergency Mitigation: Fortinet temporarily disabled FortiCloud SSO and now…

|
Published
Surfshark Clears Independent Security Audit, Infrastructure Meets Top Protection Standards

Key TakeawaysSurfshark infrastructure security audit: Independent SecuRing audit found no critical flaws and confirmed strong protection against real-world cyber threats.Real-world attack testing: Systems were tested…

|
Published

Unathi Thosago – Parliament of South Africa Unathi Thosago has been appointed chief information officer of South Africa’s Parliament, assuming responsibility for the institution’s information…

|
Published

Key TakeawaysContract Termination: The U.S. Treasury canceled all 31 active contracts with Booz Allen Hamilton, due to failures to protect data.Insider Data Access: A former…

|
Published

Cybercrime leaves no hiding place. In Athens, police dismantled a mobile base station operating from a car that made cyber operations fit in a parking…

|
Published on January 24, 2026

Key TakeawaysOperational Error: A security failure exposed the INC ransomware group infrastructure, containing data exfiltrated from multiple victims.Data Recovery: Cybersecurity researchers accessed and recovered stolen…

|
Published on January 23, 2026
Microsoft logo on a building

Key TakeawaysService Impact: A significant outage is preventing enterprise customers in North America from accessing core services like Exchange Online, SharePoint, and Teams.Infrastructure Failure: Microsoft…

|
Published on January 23, 2026

Key TakeawaysTargeted Doxing: A hacker using the alias "Vindex" has leaked the alleged personal data of senior officials from Spain’s Ministry of Transport.Political Motivation: The…

|
Published on January 23, 2026

Key TakeawaysVishing Tactic: Sophisticated voice-based social engineering attacks combined with real-time phishing kits to target employees and steal Okta SSO credentials.MFA Bypass: Custom phishing platforms…

|
Published on January 23, 2026
UK Considers New Rules on VPNs and Social Media to Protect Children Online

Key TakeawaysUK VPN consultation: Government launches review as Lords vote to ban VPNs for under-18s.House of Lords decision: Peers back VPN restrictions and social media…

|
Published on January 23, 2026
Surfshark Android Support Update Affects Older Device Users

Key TakeawaysSurfshark Android support update: Ends app updates for Android 5; Android 6+ devices remain fully supported.Reason for change: Older Android versions lack security patches,…

|
Published on January 23, 2026
Hacker - TV - News - World Map - Domains

Key TakeawaysOpportunistic Threats: An increase in Venezuela-related domain registrations indicates that actors aim to exploit geopolitical uncertainty for financial fraud and PII harvesting.Operational Tactics: These…

|
Published on January 22, 2026

Key TakeawaysUrgency Tactic: Attackers are impersonating LastPass in emails, falsely claiming imminent maintenance to pressure users into "backing up" their vaults within 24 hours.Credential Theft:…

|
Published on January 22, 2026
Hackers - Screens - Credentials

Key TakeawaysIncident Type: The security event affecting Spanish retailer PcComponentes was a credential stuffing attack, not a direct breach of the company's internal systems.Data Source:…

|
Published on January 22, 2026
Arrest - Mobile Phone - Handcuffs - Police - Vehicle - Car

Key TakeawaysMobile Impersonation: Greek authorities have dismantled a criminal operation that used a fake mobile base station hidden in a car to send mass phishing…

|
Published on January 22, 2026
Office - Staff - Confused - Cloud

Key TakeawaysGrowing Gap: Almost 70% of organizations cite tool sprawl and visibility gaps impeding cloud security, widening the disconnect between cloud velocity and security capabilities.Confidence…

|
Published on January 21, 2026

Key TakeawaysDeceptive Tactics: Mobile-optimized phishing sites impersonate PNB MetLife to steal policyholder data and facilitate fraudulent transactions.Data Exfiltration: The malicious pages use Telegram bots to…

|
Published on January 21, 2026

Key TakeawaysSupply Chain Vulnerability: Reports indicate a critical escalation in cyber risks targeting the wholesale and retail sectors through third-party vendors.Ransomware Persistence: Ransomware remains a…

|
Published on January 21, 2026

Key TakeawaysTargeted Campaign: A cyber campaign, dubbed Operation Nomad Leopard, is actively targeting Afghan government employees with spear-phishing emails.Deceptive Lures: Decoy documents disguised as official…

|
Published on January 21, 2026

Key TakeawaysVulnerability Identified: A misconfigured GraphQL endpoint on the UStrive mentorship platform allowed authenticated users to access the private data of other users.Scope of Exposure:…

|
Published on January 21, 2026
For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: