Coinbase
03
Jun
2025

Coinbase breach tied to bribed TaskUs support agents in India

A recently disclosed data breach at Coinbase has been linked to India-based customer support representatives from outsourcing firm TaskUs, who threat…

10-Year-Old Roundcube RCE Vulnerability Let Attackers Execute Malicious Code
03
Jun
2025

10-Year-Old Roundcube RCE Vulnerability Let Attackers Execute Malicious Code

A decade-old critical security vulnerability has been discovered in Roundcube Webmail that could allow authenticated attackers to execute arbitrary code…

State-Sponsored Groups Intensify Attacks on Manufacturing Sector and OT Systems
03
Jun
2025

State-Sponsored Groups Intensify Attacks on Manufacturing Sector and OT Systems

The manufacturing sector has emerged as a prime target for cyber attackers in 2024, with a staggering 71% surge in…

Compliance Platform Vanta Exposes Customer Info via Software Bug
03
Jun
2025

Code Bug at Compliance Firm Vanta Leaks Customer Data to Other Clients

Compliance automation provider Vanta confirms a software bug exposed private customer data to other users, impacting hundreds of clients. Learn…

Top ransomware groups - SafePay, Qilin, Akira, Play
03
Jun
2025

SafePay, DevMan Emerge As Major Ransomware Threats

SafePay’s journey to the top of the ransomware leaderboard was a quick one. The SafePay ransomware group first emerged in…

UK Cyberwarfare
03
Jun
2025

The UK Brings Cyberwarfare Out of the Closet

The UK’s 2025 Strategic Defence Review (SDR) details a plan to integrate its military defensive and offensive capabilities through increased…

CrowdStrike, Microsoft aim to eliminate confusion in threat group attribution
03
Jun
2025

CrowdStrike, Microsoft aim to eliminate confusion in threat group attribution

CrowdStrike and Microsoft announced an agreement Monday to formally connect the different names each company uses for the same threat…

RubyGems
03
Jun
2025

Malicious RubyGems pose as Fastlane to steal Telegram API data

Two malicious RubyGems packages posing as popular Fastlane CI/CD plugins redirect Telegram API requests to attacker-controlled servers to intercept and…

CISOs Role in Driving Secure Digital Transformation
03
Jun
2025

CISOs Role in Driving Secure Digital Transformation

As cybercrime costs surge toward an estimated $10.5 trillion annually by 2025, Chief Information Security Officers (CISOs) are stepping out…

How the Farm Industry Spied on Animal Rights Activists and Pushed the FBI to Treat Them as Bioterrorists
03
Jun
2025

How the Farm Industry Spied on Animal Rights Activists and Pushed the FBI to Treat Them as Bioterrorists

Hundreds of emails and internal documents reviewed by WIRED reveal top lobbyists and representatives of America’s agricultural industry led a…

Researchers Reveal Container-Based Attacks Through Host-Based Log Analysis
03
Jun
2025

Researchers Reveal Container-Based Attacks Through Host-Based Log Analysis

Cybersecurity researchers have shed light on the often-underestimated vulnerabilities in containerized environments, emphasizing the critical role of host-based log analysis…

The Role of Continuous Integration and Continuous Deployment (CI/CD) in DevOps
03
Jun
2025

The Role of Continuous Integration and Continuous Deployment (CI/CD) in DevOps

Modern software development demands rapid delivery of high-quality applications that can adapt to changing business requirements and user expectations. Continuous…