Encrypted Chats from Sky ECC, ANOM Lead to 232 Arrests
Intelligence from encrypted platforms like Sky ECC and ANOM has led to the arrest of 232 individuals and the seizure of millions in assets in…
Intelligence from encrypted platforms like Sky ECC and ANOM has led to the arrest of 232 individuals and the seizure of millions in assets in…
4chan is down amid claims from a rival Soyjak forum user who says they’ve breached the site and leaked its source code. Investigation is ongoing.…
CloudSEK uncovers a sophisticated malware campaign where attackers impersonate PDFCandy.com to distribute the ArechClient2 information stealer. Learn how this scam works and how to protect…
8M UK healthcare worker records, including IDs and financial data, exposed due to a misconfigured staff management database from UK-based software firm Logezy. Cybersecurity researcher…
AI code tools often hallucinate fake packages, creating a new threat called slopsquatting that attackers can exploit in public code repositories, a new study finds.…
Trend Micro found major flaws in the NVIDIA Container Toolkit and Docker, risking container escapes, DoS attacks and AI infrastructure. Users should audit setups and…
A new wave of smartphone-based attacks is draining crypto wallets without victims ever realizing it. According to researchers at Doctor Web, a surge in malware-laced…
Hackers exploit Fortinet flaws to plant stealth backdoors on FortiGate devices, maintaining access even after patches. Update to secure versions now. Cybersecurity researchers at Fortinet…
Data breach at Laboratory Services Cooperative (LSC) exposed the sensitive health and personal information of 1.6 million individuals linked to select Planned Parenthood centers. Learn…
As organizations increasingly rely on SaaS applications to run their operations, securing them has become a necessity. Without strong protection, sensitive data, user access, and…
Russian APT group Storm-2372 employs device code phishing to bypass Multi-Factor Authentication (MFA). Targets include government, technology, finance, defense, healthcare. Cybersecurity researchers at SOCRadar have…
TL;DR: A critical deserialization vulnerability (CVSS 9.8 – CVE-2025-27520) in BentoML (v1.3.8–1.4.2) lets attackers execute remote code without authentication. Discovered by Checkmarx Zero. Upgrade to…