New Nginx 1.29.8 and FreeNginx Versions Patch Critical Security Flaws
Web server administrators need to prioritize a crucial update this week. The developers behind Nginx and the community-driven FreeNginx project have released new versions to…
Web server administrators need to prioritize a crucial update this week. The developers behind Nginx and the community-driven FreeNginx project have released new versions to…
An ongoing spying operation has been discovered, specifically targeting journalists and opposition politicians across the Middle East. Researchers from the digital rights group Access Now…
More than $12 million has been frozen, and over 20,000 victims have been identified in an international law enforcement operation targeting cryptocurrency and investment scammers.…
Ravie LakshmananApr 13, 2026Cybercrime / Threat Intelligence The U.S. Federal Bureau of Investigation (FBI), in partnership with the Indonesian National Police, has dismantled the infrastructure…
The AI debate right now centres almost entirely on models – which LLM is smarter, whether they’ll be commoditised, whether OpenAI or Anthropic or Google…
The fallout from the Axios npm supply chain attack continues to widen, with OpenAI issuing a detailed response outlining its exposure and remediation steps. The…
Rockstar Games has confirmed a new security breach involving unauthorized access to internal data. The company behind GTA 5 and the Grand Theft Auto franchise…
Booking.com has notified some customers that hackers may have accessed information associated with their travel reservations. In notifications shared online by users, the Amsterdam-based online…
Citizen Lab: Webloc tracked 500M devices for global law enforcement Pierluigi Paganini April 13, 2026 Citizen Lab reported that law enforcement used the surveillance tool…
A survey by Sygnia reveals that senior-level security leaders fear they are not prepared to respond to the next cyberattack. Source link
How the flaw works Marimo’s server includes a built-in terminal feature that lets users run commands directly from the browser. That terminal was accessible over…
Security teams are flooded with logs, yet every alert demands fast, accurate context. In Verizon’s 2025 Data Breach Investigations Report [1], they analyzed 22,052 security…