ShinyHunters Leak Alleged Data from Qantas, Vietnam Airlines and Other Major Firms
On October 3, 2025, Hackread.com published an in-depth report in which hackers claimed to have stolen 989 million records from 39 major companies worldwide by…
On October 3, 2025, Hackread.com published an in-depth report in which hackers claimed to have stolen 989 million records from 39 major companies worldwide by…
The United Arab Emirates’ (UAE) ambition to become a global leader in artificial intelligence (AI) was one of the most discussed points at the Gitex…
Microsoft is investigating an ongoing incident that is preventing some customers from accessing Microsoft 365 applications. While the company has yet to share which regions…
North Korean state-sponsored threat actors have intensified their supply chain attacks against software developers through a sophisticated campaign dubbed “Contagious Interview,” deploying 338 malicious npm…
Microsoft Edge has identified and mitigated a critical threat exploiting its Internet Explorer (IE) compatibility mode, closing off high-risk entry points and reinforcing security for…
At Gitex 2025 in Dubai, the largest tech show in the Middle East, Chiara Marcati, chief AI advisory and business officer at AI71, discusses the…
Researchers warn that threat actors have compromised more than a hundred SonicWall SSLVPN accounts in a large-scale campaign using stolen, valid credentials. Although in some…
Security researchers have identified a sophisticated malware campaign that exploits WhatsApp’s messaging platform to deploy banking trojans targeting Brazilian financial institutions and cryptocurrency exchanges. The…
At their core, alerts exist to bring attention to something meaningful: an indicator of compromise (IOC), an indicator of attack (IOA), or a suspicious behavior…
EDR-Freeze is a proof-of-concept tool that forces endpoint detection and response (EDR) or antivirus processes into a temporary “coma.” Instead of installing a vulnerable driver, it…
Today, we are excited to announce Varonis Interceptor, AI-native email security. AI has enabled a new breed of email threats that are more deceptive than…
A critical vulnerability in Lenovo’s Dispatcher drivers has come under the spotlight after researchers released a proof-of-concept exploit that demonstrates privilege escalation on affected Windows…