FBI, CISA Warn About Scattered Spider Cyberattacks
29
Jul
2025

FBI, CISA Warn About Scattered Spider Cyberattacks

The FBI and CISA issued updated guidance today on the Scattered Spider threat group, including information on recent attack techniques…

CISA says it will release telecom security report sought by Sen. Wyden to lift hold on Plankey nomination
29
Jul
2025

CISA says it will release telecom security report sought by Sen. Wyden to lift hold on Plankey nomination

Sean Plankey’s path to leading the Cybersecurity and Infrastructure Security Agency might have one obstacle set to be cleared for…

Aeroflot
29
Jul
2025

Russian airline Aeroflot grounds dozens of flights after cyberattack

Aeroflot, Russia’s flag carrier, has suffered a cyberattack that resulted in the cancellation of more than 60 flights and severe…

Want To Detect Incidents Before It's Too Late? You Need Threat Intelligence
29
Jul
2025

Want To Detect Incidents Before It’s Too Late? You Need Threat Intelligence

The difference between a minor security incident and a devastating breach often comes down to one critical factor: how quickly…

Android Banking Malware Masquerades as Government Agencies to Attack Users
29
Jul
2025

Android Banking Malware Masquerades as Government Agencies to Attack Users

Cyble Research and Intelligence Labs (CRIL) has uncovered a sophisticated Android banking trojan dubbed RedHook, which disguises itself as legitimate…

Driven by data: The RAF’s revamped maritime patrol capabilities
29
Jul
2025

European Commission ignores calls to reassess Israel data adequacy

The European Commission (EC) has been ignoring calls to reassess Israel’s data adequacy status for over a year, despite “urgent…

Hackers leak images and comments from women dating safety app Tea
29
Jul
2025

Hackers leak images and comments from women dating safety app Tea

Hackers leak images and comments from women dating safety app Tea Pierluigi Paganini July 29, 2025 The dating safety app…

How to identify the origin IP
29
Jul
2025

How to identify the origin IP

Most of your targets often resort to using content delivery networks (CDNs) or other anti-DDoS reverse proxies to mask their…

29
Jul
2025

How attackers are still phishing “phishing-resistant” authentication

As awareness grows around many MFA methods being “phishable” (i.e. not phishing resistant), passwordless, FIDO2-based authentication methods (aka. passkeys) like…

PyPI Warns of New Phishing Attack Targeting Developers With Fake PyPI site
29
Jul
2025

PyPI Warns of New Phishing Attack Targeting Developers With Fake PyPI site

The Python Package Index (PyPI) has issued an urgent warning to developers about an ongoing phishing campaign that exploits domain…

Qilin Ransomware Gains Momentum with Legal Assistance Option for Affiliates
29
Jul
2025

Qilin Ransomware Gains Momentum with Legal Assistance Option for Affiliates

The Qilin ransomware gang has introduced a “Call Lawyer” feature for its affiliates, announced on a Russian-speaking darknet forum. This…

New Choicejacking Attack Steals Data from Phones via Public Chargers
29
Jul
2025

New Choicejacking Attack Steals Data from Phones via Public Chargers

If you thought using a public phone charger was safe, it’s time to think again. Despite years of updates aimed…