The who, what, and why of the attack that has shut down Stryker’s Windows network
What else is known about Handala Hack? The group has existed since at least 2023. It takes its name from a character in the political…
What else is known about Handala Hack? The group has existed since at least 2023. It takes its name from a character in the political…
Researchers from Cydome have disclosed three vulnerabilities affecting NAVTOR NavBox version 4.12.0.3, a maritime connectivity device widely used on vessels to manage chart updates, navigation…
Finland’s intelligence service warned that state-backed cyber espionage remains a persistent threat to the country, with Russia and China actively targeting government networks, technology firms,…
Welcome to this week’s edition of the Threat Source newsletter. I am the product of a single parent, my mom, who along with my grandparents…
Browser extensions are ubiquitous, offering users enhanced functionality and customization. However, they also represent a significant, often overlooked, attack surface. The very nature of extensions—small…
Microsoft is investigating a new issue affecting some Samsung laptops running Windows 11 after installing the February 2026 security updates, in which users lose access…
Malicious npm Packages Target Discord Crypto Wallets JFrog security researchers Guy Korolevski and Meitar Palas uncovered a sophisticated supply chain attack on the npm ecosystem…
Cybersecurity firm Huntress is expanding its partner programme to include resellers, a move the company says will extend enterprise-grade protection to small and mid-sized businesses…
A bipartisan privacy coalition in the United States Congress introduced legislation on Thursday that would impose a strict warrant requirement on the FBI’s backdoor searches…
The GlassWorm malware campaign has evolved, significantly escalating its attacks on software developers. Instead of embedding malware directly into initial releases, the threat actors are…
Artificial Intelligence (AI) is rapidly transforming the landscape of cybersecurity, offering advanced tools to detect, prevent, and respond to threats across multiple sectors. As cyberattacks…
A large international cybercrime operation coordinated by INTERPOL has disrupted thousands of systems used for phishing, malware distribution, and ransomware attacks. The operation, called Operation…