The Intersection Of Ethical Hacking And Investigative Journalism
“Scam Interceptors is kind of a unique show in that we basically blend ethical hacking with investigative journalism, and we use those two separate skill sets…
“Scam Interceptors is kind of a unique show in that we basically blend ethical hacking with investigative journalism, and we use those two separate skill sets…
SmarterTools, the company behind the popular Microsoft Exchange alternative SmarterMail, has been breached by a ransomware-wielding group that leveraged a recently fixed vulnerability in that…
This week on the Lock and Code podcast… In January, Google settled a lawsuit that pricked up a few ears: It agreed to pay $68…
Ravie LakshmananFeb 09, 2026Cyber Espionage / Virtualization The Cyber Security Agency (CSA) of Singapore on Monday revealed that the China-nexus cyber espionage group known as…
A series of cyber attacks against the Polich electricity grid that unfolded at the end of December 2025 have prompted a fresh warning from the…
The European Commission’s central infrastructure for managing mobile devices was hit by a cyberattack on January 30, the Commission has revealed. The announcement said the…
SmarterTools was breached by hackers exploiting a vulnerability in its own SmarterMail software through an unknown virtual machine set up by an employee that wasn’t…
The Queensland government has assembled a team of 120 staff to remediate a $183 million client and case management system built for child safety in…
Critical Fortinet FortiClientEMS flaw allows remote code execution Pierluigi Paganini February 09, 2026 Fortinet warns of a critical FortiClientEMS vulnerability that lets remote attackers run…
Listen to the article 5 min This audio is auto-generated. Please let us know if you have feedback. Ransomware and other cyberattacks represent a tiny…
The Great Wall of China was built to slow northern raiders and prevent steppe armies from riding straight into the empire’s heart. Yet in 1644,…
Hackers are exploiting SolarWinds Web Help Desk (WHD) vulnerabilities to deploy legitimate tools for malicious purposes, such as the Zoho ManageEngine remote monitoring and management…