Security teams spend much of their time tracking vulnerabilities, abuse patterns, and system failures. A new study argues that many…
Sedgwick discloses data breach after TridentLocker ransomware attack Pierluigi Paganini January 05, 2026 Sedgwick confirmed a cyber incident at its…
Chirag Shah, Global Information Security Officer & DPO at Model N examines how cyber risk in pharma and life sciences…
The European Space Agency (ESA) has confirmed a cybersecurity breach involving servers located outside its corporate network. This confirmation comes…
A newly disclosed security warning has drawn attention to potential risks at the HitBTC Exchange after blockchain security firm SlowMist…
QNAP has patched multiple security vulnerabilities in its License Center application that could allow attackers to access sensitive information or disrupt services on affected NAS devices….
OpenAEV is an open source platform designed to plan, run, and review cyber adversary simulation campaigns used by security teams….
Resecurity deploys synthetic data honeypots to outsmart threat actors, turning reconnaissance into actionable intelligence. A recent operation not only trapped…
In this interview, we dive into Doctoring Documents: Mistruth in History and Cybersecurity, exploring how misinformation has evolved from ancient…
A self-described security researcher operating under the pseudonym Martha Root has breached and exposed thousands of user profiles from a…
Under the five-year plan called Fintech 2030 that starts this year, the HKMA would expand the scope of the city’s…
Resecurity Caught ShinyHunters in Honeypot Pierluigi Paganini January 04, 2026 Resecurity caught ShinyHunters (SLH) using decoy accounts; the group attacked airlines,…