The cybercrime world operates in shadows, but when insiders turn against each other, those shadows shrink. In February 2025, an…
A Jordanian man accused of selling stolen access to corporate networks has pleaded guilty in a US federal court, admitting…
The roles of several senior technology executives in Victoria Police, including its chief digital officer Dr Steve Hodgkinson, are in…
A new malware campaign has emerged that tricks people into downloading fake Malwarebytes software, putting their login credentials and cryptocurrency…
Genians Security Center has published an in-depth analysis of Operation Poseidon, a sophisticated APT campaign attributed to the Konni threat…
Ransomware attack on Ingram Micro impacts 42,000 individuals Pierluigi Paganini January 19, 2026 Ingram Micro says a ransomware attack exposed…
Windows Subsystem for Linux 2 (WSL2) is meant to give developers a fast Linux environment on Windows. Now attackers are…
An unnamed organization recently discovered that several employees’ paychecks had silently vanished not because of a ransomware attack, data-wiping malware,…
Cybersecurity researchers have disclosed details of a security flaw that leverages indirect prompt injection targeting Google Gemini as a way…
A critical zero-day vulnerability in Cloudflare’s Web Application Firewall (WAF) allowed attackers to bypass security controls and directly access protected…
Windows Subsystem for Linux (WSL) has transformed the developer experience on Windows. However, it has also quietly created a powerful…
The U.K. government is warning of continued malicious activity from Russian-aligned hacktivist groups targeting critical infrastructure and local government organizations…