China-based threat actors have exploited the critical ToolShell vulnerability in Microsoft SharePoint servers to infiltrate networks across multiple continents, targeting…
A major gang that sells a secret data-stealing tool called Lumma Stealer, a highly adaptable Malware-as-a-Service (MaaS) marketed since 2022…
The UK government is being pressed for a response as to why a major, multi-hour Amazon Web Services (AWS) outage in…
The late summer cyberattack on Jaguar Land Rover led to a $2.5 billion (1.9 billion pound) financial hit on the…
Meta has announced new tools to help WhatsApp and Messenger users protect themselves from potential scams and secure their accounts. On Messenger,…
When users authenticate to Microsoft cloud services, their activities generate authentication events recorded across multiple logging systems. Microsoft Entra sign-in…
No industry is spared from cyber-attacks. But some have greater consequences than others. When a hospital or medical group experiences…
In September 2025, Texas A&M University System (TAMUS) Cybersecurity, a managed detection and response provider, in collaboration with Elastic Security…
Following a nine-month investigation, the Competition and Markets Authority (CMA) has designated Google’s provision of its mobile platform with strategic…
The Trump administration has effectively closed the division of the Cybersecurity and Infrastructure Security Agency that coordinates critical infrastructure cybersecurity…
A sophisticated phishing kit dubbed Tykit, which impersonates Microsoft 365 login pages to harvest corporate credentials. First detected in May…
Threat actors are increasingly targeting Azure Blob Storage, Microsoft’s flagship object storage solution, to infiltrate organizational repositories and disrupt critical…











