4.4 Million US Consumers’ Data Stolen
A TransUnion data breach exposed 4.4 million US consumers’ Social Security numbers via a Salesforce hack. The attack is linked to hacker groups UNC6395. A…
A TransUnion data breach exposed 4.4 million US consumers’ Social Security numbers via a Salesforce hack. The attack is linked to hacker groups UNC6395. A…
29 Aug From Pyramid of Pain to Pyramid of Influence: Rethinking the Analyst’s Role in the Human-Augmented SOC Posted at 11:02h in Blogs by Taylor…
Continue reading online to avoid the email cutoff issue > Unsupervised Learning is a Security/AI newsletter about how to transition from Human 2.0 to Human…
Since its emergence in February 2025, the NightSpire ransomware group has rapidly distinguished itself through a sophisticated double-extortion strategy that combines targeted encryption with public…
Cyber claims have continued their upwards trend over the past year, driven in large part by a rise in data and privacy breach incidents. The…
A recently uncovered vulnerability in the Visual Studio Code (VS Code) Marketplace has allowed malicious actors to hijack discontinued extension names and slip malware past…
An abandoned update server associated with input method editor (IME) software Sogou Zhuyin was leveraged by threat actors as part of an espionage campaign to…
The Home Office sought access to data and messages stored by Apple users on its cloud storage in the UK and overseas by demanding a…
I don’t have any insider knowledge—unless you count the >Information > article > that just leaked about a possible Her-like assistant—but I think I have…
China’s reliance on domestic technology companies to carry out large-scale hacking operations—as highlighted by the U.S. government and its allies this week—is a weakness that…
Microsoft has found no link between the August 2025 KB5063878 security update and customer reports of failure and data corruption issues affecting solid-state drives (SSDs) and…
In June 2025, a previously undocumented campaign leveraging end-of-support software began surfacing in telemetry data gathered across Eastern Asia. Dubbed TAOTH, the operation exploits an…