Jessica Hunter — Government of Australia The Australian Government has appointed Jessica Hunter as Ambassador for Cyber Affairs and Critical Technology. A veteran of the…
Coordinated attacks: At least two hacktivist groups have claimed responsibility for launching DDoS attacks against multiple high-profile Indian websites. Government and education: These include critical…
Massive impact: A significant AWS outage caused widespread disruptions for numerous popular online services, with at least 7,000 reports. Root cause: The issue was traced…
Mass repatriation: Cambodia repatriated 64 South Korean nationals under investigation for their alleged involvement in large-scale online scam operations. Detention requests: South Korean police have…
Cyber espionage allegations: China's State Security Ministry has accused the U.S. NSA of conducting a prolonged cyberattack operation. Critical infrastructure target: The facility maintains and…
The weekly news underscored how fast risk is evolving across breaches, phishing ecosystems, and software supply chains. Leaders urged action rather than waiting and watching. …
Expanding operations: A threat actor has expanded its operations from China to Taiwan, Japan, and most recently, Malaysia, using evolving malware delivery tactics. Primary malware:…
International operation: A coordinated law enforcement action led to the arrest of 7 individuals and the takedown of a massive CaaS platform. Significant seizures: Authorities…
New partnership: Law enforcement agencies using Flock's platform will be able to request video footage from Ring camera owners. Voluntary participation: The system allows police…
Claimed attack: The Cl0p ransomware group has asserted responsibility for a data breach targeting American Airlines. Sector impacted: This incident places the transportation and storage…
Coordinated attack: Hackers breached the PA systems at four airports to broadcast unauthorized messages. Third-party flaw: A cloud-based software provider and an advertisement streaming service…
Pervasive incidents: Three-quarters of organizations experienced insider-driven data loss within the last 18 months, most incidents being unintentional. Significant impact: Almost half of organizations reported…
Account compromise: The official YouTube channel for the popular game Dota 2 was briefly compromised to promote a fraudulent cryptocurrency scheme. Fraudulent promotion: Hackers used…
Distribution vector: A new banking Trojan, named Maverick, is being distributed on a massive scale through WhatsApp messages. Worm-like spread: It hijacks the victim's WhatsApp…
Nation-state attack: Cybersecurity firm F5 has disclosed a security breach attributed to state-backed hackers reportedly linked to China. Prolonged dwell time: The threat actors allegedly…
Real-Time Monitoring: Threat Protection Pro™ scans dark web databases to detect stolen session cookies immediately. Instant Alerts: Users are notified directly in-browser to log out…
Open-Source Release: NordVPN’s Linux GUI code is now public on GitHub for transparency and collaboration. Snap Integration: The updated Snap package includes the GUI, simplifying…
Massive data leak: A breach of Vietnam Airlines' Salesforce CRM has exposed over 23 million records, including sensitive data of Vietnamese and foreign government officials.…
For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: