A threat actor is compromising NGINX servers in a campaign that hijacks user traffic and reroutes it through the attacker’s…
Over the past four years, I have handled numerous international cases involving SkyECC, Ennetcom, EncroChat, and other PGP- or crypto-phone…
CVE-2025-22225 in VMware ESXi now used in active ransomware attacks Pierluigi Paganini February 04, 2026 Ransomware groups now exploit VMware…
A critical vulnerability in SolarWinds’ Web Help Desk service has been added to the US Cybersecurity and Infrastructure Security Agency’s…
Multiple critical vulnerabilities in the popular n8n open-source workflow automation platform allow escaping the confines of the environment and taking…
Artificial intelligence (AI) I hasn’t just hit the big leagues; it is the big leagues. Over the course of 2025, AI was embedded into…
Before the New England Patriots and Seattle Seahawks face off at Super Bowl LX, Levi’s Stadium needed a tech upgrade…
Persistent weaknesses in cyber security posture and policy are imposing costs on the UK’s economy, hampering growth, and exposing critical…
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has been “silently” updating its Known Exploited Vulnerabilities (KEV) catalog when it…
Nvidia CEO Jensen Huang dismissed fears that artificial intelligence will replace software and related tools, calling the idea “illogical”, after…
Taiwanese operator of Incognito Market sentenced to 30 years over $105M darknet drug ring Pierluigi Paganini February 04, 2026 A…
Infrastructure delivering updates for Notepad++—a widely used text editor for Windows—was compromised for six months by suspected China-state hackers who…
