$ page 5/37

North Korean hackers spread over 1,700 malicious packages across major code registries

A North Korea-linked campaign has published over 1,700 malicious packages in multiple code registries, targeting developers using a wide array of lang

2 min readApr 13

Beyond the battlefield: Russia's relentless cyber war on Ukraine during the 2022 Easter truce

While a kinetic "Easter truce" was violated in 2022, Russia's cyber war against Ukraine intensified, targeting critical infrastructure with wipers and

7 min readApr 13

APT28 deploys advanced PRISMEX malware in new campaign against Ukraine and NATO allies

Russian state-sponsored actor APT28 is targeting Ukraine and NATO allies with PRISMEX, a new malware suite using steganography and COM hijacking.

6 min readApr 12

Passport numbers for more than 300,000 leaked during December Eurail data breach

Eurail.com suffered a major data breach, exposing passport numbers and other PII for over 300,000 customers after a hacker exploited an exposed API to

6 min readApr 12

Unsanctioned AI use creates new corporate security blind spots

Employees using unapproved AI tools are creating 'Shadow AI,' a major security risk involving data leaks, IP theft, and compliance violations.

2 min readApr 12

Microsoft finds vulnerability exposing millions of Android crypto wallet users

A vulnerability in a third-party SDK used by major Android crypto apps exposed millions of users to data theft, according to Microsoft researchers.

2 min readApr 12

Attackers exploit 80% of critical vulnerabilities before patches are applied, study finds

A Qualys analysis of 1 billion records finds attackers exploit 80% of CISA KEVs before defenders can patch, showing human-scale security is failing.

2 min readApr 12

Nearly 4,000 US industrial devices are exposed to Iranian cyberattacks

An attack on a US water facility revealed a graver threat: nearly 4,000 industrial controllers are exposed online, making them easy targets for Irania

6 min readApr 12

Ukraine's shadow war: Zelenskyy claims Iranian drone shootdowns in the Middle East

President Zelenskyy's claim of downing Iranian drones in the Middle East signals Ukraine's shift from a defense recipient to a global security exporte

6 min readApr 12

Beyond the headlines: How nation-states weaponize opinion in the digital age

Public opinion polls reflect a moment in time, but nation-states now use sophisticated cyber tactics to actively shape those views as a form of modern

5 min readApr 12

When the pumps run dry: A 2013 IT meltdown was a warning for critical infrastructure

In 2013, a massive IT failure, not a cyberattack, crippled Ireland's largest fuel retailer. This analysis explores the technical breakdown and its les

6 min readApr 12

Citizen Lab: How law enforcement used ad data to track millions of devices

A Citizen Lab report reveals how a surveillance tool called Webloc uses real-time bidding ad data to enable global location tracking by law enforcemen

6 min readApr 12