ShinyHunters Tactics Now Mirror Scattered Spider
There’s growing evidence that two of arguably the most dangerous cybercrime groups out there are tag-teaming big targets.
There’s growing evidence that two of arguably the most dangerous cybercrime groups out there are tag-teaming big targets.
Most security tools can’t see what happens inside the browser, but that’s where the majority of work, and risk, now
The Dutch National Cyber Security Centre (NCSC-NL) has warned of cyber attacks exploiting a recently disclosed critical security flaw impacting
A swarm of US agencies joined with international partners to take down servers and domains and seize more than $1
REvil affiliate Yaroslav Vasinskyi, who was convicted last year for his role in the 2021 Kaseya ransomware supply chain attack,
Researchers paired the jailbreaking technique with storytelling in an attack flow that used no inappropriate language to guide the LLM
Cybersecurity researchers have discovered a fresh set of security issues in the Terrestrial Trunked Radio (TETRA) communications protocol, including in
The OPC UA communication protocol is widely used in industrial settings, but despite its complex cryptography, the open source protocol
Malicious actors have been observed exploiting a now-patched critical security flaw impacting Erlang/Open Telecom Platform (OTP) SSH as early as
GitGuardian’s 2025 State of Secrets Sprawl Report reveals an alarming expansion of credential exposure across enterprise environments, with collaboration tools