Police intercept evidence from Sky ECC cryptophone network ‘unreliable’, Antwerp court told
A court in Belgium has refused to allow defence lawyers in a high-profile drugs case extra time after a forensic expert found that digital evidence…
A court in Belgium has refused to allow defence lawyers in a high-profile drugs case extra time after a forensic expert found that digital evidence…
Researchers warn that a recently disclosed extortion campaign linked to ShinyHunters represents an escalation of tactics used by the group. ShinyHunters late last month claimed…
A dangerous new data-wiping malware known as DynoWiper has emerged, targeting energy companies in Poland with destructive attacks designed to permanently erase critical data. The…
Ravie LakshmananFeb 02, 2026Kerberos / Enterprise Security Microsoft has announced a three-phase approach to phase out New Technology LAN Manager (NTLM) as part of its…
Over the holidays, I found some time to work on a small idea I had for a while. As a sometimes-Google Workspace admin with a…
A newly formed Russian hacker alliance known as Russian Legion has launched a coordinated cyberattack campaign against Denmark, threatening critical infrastructure and government services. The…
Multi-factor authentication (MFA) is supposed to defend against phishing attacks, but threat actors operating under the ShinyHunters banner are using it as a pretext in…
SiteKiosk – Breakout It has been a while since my last blog post, therefore I am going to share two possible bypasses for the software…
Fraudulent High-Yield Investment Programs (HYIPs) are surging globally, pushing “guaranteed” profits that no legitimate investment can sustain. These scams lure victims with a simple pitch:…
A previously unknown hacktivist group called Punishing Owl has emerged with sophisticated cyberattacks targeting Russian government security agencies. The group first surfaced on December 12,…
A substantial expansion in cybercrime operations using tactics consistent with ShinyHunters-branded extortion campaigns. These sophisticated operations employ advanced voice phishing (vishing) and victim-branded credential harvesting…
Research from watchTowr reveals these zero-day vulnerabilities are being actively exploited. Apply the emergency RPM patch now. Cybersecurity researchers are warning of a major security…