18
Nov
2025

Tycoon 2FA and the Collapse of Legacy MFA

The rise of the Tycoon 2FA phishing kit should serve as a global warning siren for every enterprise. This is…

Cloudflare Global Outage Breaks Internet
18
Nov
2025

Cloudflare Global Outage Breaks Internet

A widespread outage at Cloudflare, a critical internet infrastructure provider, disrupted access to numerous high-profile websites and services on November…

Internet slowly recovers after far-reaching Cloudflare outage
18
Nov
2025

Internet slowly recovers after far-reaching Cloudflare outage

A currently undisclosed issue has crippled Cloudflare’s network and has rendered a large swathe of internet’s most popular sites and…

DoorDash
18
Nov
2025

Thieves order a tasty takeout of names and addresses from DoorDash

DoorDash is known for delivering takeout food, but last month the company accidentally served up a tasty plate of personal…

European Commission launches AWS and Microsoft-focused cloud competition probes
18
Nov
2025

European Commission launches AWS and Microsoft-focused cloud competition probes

Amazon Web Services (AWS) and Microsoft’s dominant hold on the cloud computing market is to come under renewed scrutiny, with…

Princeton University Data Breach - Database with Donor Info Compromised
18
Nov
2025

Princeton University Data Breach – Database with Donor Info Compromised

Princeton University faced a security incident on November 10, 2025, when outside attackers gained unauthorized access to a database managed…

Lazarus APT Group's New ScoringMathTea RAT Enhances Remote Command Execution and More
18
Nov
2025

Lazarus APT Group’s New ScoringMathTea RAT Enhances Remote Command Execution and More

The Lazarus APT Group, an advanced persistent threat (APT) attributed to North Korea, has deployed a sophisticated new Remote Access…

Kentik AI Advisor brings intelligence and automation to network design and operations
18
Nov
2025

Kentik AI Advisor brings intelligence and automation to network design and operations

Kentik has launched the Kentik AI Advisor, an agentic AI solution that understands enterprise and service provider networks, thinks critically,…

Seven npm Packages Use Adspect Cloaking to Trick Victims Into Crypto Scam Pages
18
Nov
2025

Seven npm Packages Use Adspect Cloaking to Trick Victims Into Crypto Scam Pages

Cybersecurity researchers have discovered a set of seven npm packages published by a single threat actor that leverages a cloaking…

One year on from the CrowdStrike outage: What have we learned?
18
Nov
2025

CCS under fire over ‘anti-SME’ supplier requirements for G-Cloud 15

The Crown Commercial Service (CCS) stands accused of making parts of its flagship cloud computing framework, G-Cloud, inaccessible to small…

Hackers increasingly target operational technology, with manufacturing sector bearing the brunt
18
Nov
2025

Hackers increasingly target operational technology, with manufacturing sector bearing the brunt

Listen to the article 4 min This audio is auto-generated. Please let us know if you have feedback. Dive Brief:…

A Simple WhatsApp Security Flaw Exposed 3.5 Billion Phone Numbers
18
Nov
2025

A Simple WhatsApp Security Flaw Exposed 3.5 Billion Phone Numbers

WhatsApp’s mass adoption stems in part from how easy it is to find a new contact on the messaging platform:…