Salt Typhoon Targets Telecoms via Router Flaws, Warn FBI and Canada
A newly released advisory from the FBI and Canada’s Cyber Centre warns of an ongoing cyber espionage campaign by a China-linked group that is targeting…
A newly released advisory from the FBI and Canada’s Cyber Centre warns of an ongoing cyber espionage campaign by a China-linked group that is targeting…
Norths Collective’s chief marketing and innovation officer Robert Lopez is stepping away from the role after over 13 years. Lopez announced his planned departure from the…
Nucor, the leading steel manufacturer in the U.S., said it has restored operations following a hack in May that compromised a limited amount of information.…
Four members of the notorious cybercriminal group REvil were found guilty of financial fraud and computer crimes targeting primarily American victims, but were released after…
Cybersecurity experts at SecurityScorecard have discovered a widespread cyber espionage operation, dubbed LapDogs, which has compromised an unknown number of devices (probably thousands) around the…
SA Water is embarking on a multi-year IT transformation program focused on redesigning and modernising its core systems. Elise Vervetjes (SA Water) Known as the…
Google has revealed a thorough protection technique aimed at indirect prompt injection attacks, a subtle but powerful threat, marking a major advancement in cybersecurity in…
NAB has detailed its 2023 Teradata decommissioning publicly for the first time, revealing how the data team rebuffed pressure to build a ‘like’ replacement, and…
Summary 1. CVE-2025-49825 allows attackers to remotely bypass Teleport's authentication controls, affecting multiple versions of the secure access platform. 2. Teleport has issued security updates for…
The national team for responding to cyber incidents, CERT-UA, has exposed a sophisticated cyberattack targeting the information and communication system (ICS) of a central executive…
APT36, also known as Transparent Tribe, a Pakistan-based cyber espionage group, has launched a highly sophisticated phishing campaign targeting Indian defense personnel. According to recent…
Summary 1. Harmful Objective Concealed: Attacker defines a harmful goal but starts with benign prompts. 2. Context Poisoning: Introduces subtle cues (“poisonous seeds” and “steering…