Depthfirst Raises $80 Million in Series B Funding
Software security startup Depthfirst has raised $80 million in Series B funding, bringing the total raised to $120 million in less than three months after…
Software security startup Depthfirst has raised $80 million in Series B funding, bringing the total raised to $120 million in less than three months after…
Google links Axios npm supply chain attack to North Korea-linked APT UNC1069 Pierluigi Paganini April 01, 2026 Google links the Axios npm supply chain attack…
In March 2026, we ran BugQuest, a 31-day campaign covering everything you need to know about finding and exploiting broken access control vulnerabilities. From understanding…
Researchers link the compromise to a North Korean adversary and warn the impacts could be wide ranging. Source link
A Chinese cyberespionage group has shifted its gaze back to Europe after years of focusing on other parts of the world, Proofpoint research published Wednesday…
A housewife in Hong Kong has lost nearly HK$2.5 million (US$320,500) in an online shopping scam after she tried to buy collagen drinks for HK$530,…
Unbekannte sollen das Exilportal Iranwire gehackt haben. PX Media – shutterstock.com Hacker haben nach Angaben der iranischen Justiz mutmaßlich Zugriff auf Daten eines bekannten Exilportals erlangt.…
The Health Information Sharing and Analysis Center (Health-ISAC) released its ‘2025 After-Action Report,’ drawing on a series of seven resilience exercises conducted through regional workshops…
Australia’s Cyber and Infrastructure Security Centre (CISC) begun industry consultation on a proposed package of targeted reforms aimed at strengthening the Ministerial Directions powers under…
On October 1, 2024, over six thousand people opened the Calculator application on their computer—all at the same time. But they weren’t solving any equations…
Remote access and trusted administrative tools play a central role in how organizations operate today. According to Blackpoint Cyber’s 2026 Annual Threat Report, they are…
Artificial intelligence agents are rapidly becoming integral to enterprise workflows, but they also introduce new attack surfaces. Security researchers recently uncovered a significant vulnerability within…