Here’s how the FTC plans to enforce the Take It Down Act
The Federal Trade Commission is set to begin enforcing a key provision of the Take Down Act on May 19, requiring websites and online services…
The Federal Trade Commission is set to begin enforcing a key provision of the Take Down Act on May 19, requiring websites and online services…
“This is another reminder to find a trusted cloud provider for e-mail,” added Johannes Ullrich, dean of research at the SANS Institute. “On-premises Exchange is…
General Dynamics Information Technology (GDIT), a business unit of General Dynamics, and NightDragon, a SecureTech investment and advisory firm, announced this week a new collaboration…
Pellera Technologies announced Thursday its official listing on the Cyber AB Marketplace as a Cybersecurity Maturity Model Certification (CMMC) Registered Provider Organization (RPO). The designation…
Weaponizing a text editor for fun and profit Gather round, dear readers, because today, we (by we, we mean @h00die) dropped the ultimate persistence mechanism:…
During the second day of Pwn2Own Berlin 2026, competitors collected $385,750 in cash awards after exploiting 15 unique zero-day vulnerabilities in multiple products, including Windows…
Gunra ransomware has quickly grown from a new threat into a serious global problem, hitting dozens of organizations in less than a year. The group…
A newly disclosed vulnerability in VMware Fusion has raised serious security concerns after researchers confirmed it could allow attackers to escalate privileges to root on…
Cybersecurity researchers at Point Wild recently found a new way that cyberattackers are gaining unauthorised access to computers. The investigation, led by experts Kedar Shashikant…
Cisco has patched yet another Catalyst SD-WAN Controller authentication bypass vulnerability (CVE-2026-20182) that has been exploited as a zero-day by “a highly sophisticated cyber threat…
If you downloaded the JDownloader installer during the compromise window (May 6-7), you are advised to verify the file. JDownloader is a popular download management…
Ravie LakshmananMay 15, 2026Botnet / Threat Intelligence The Russian state-sponsored hacking group known as Turla has transformed its custom backdoor Kazuar into a modular peer-to-peer…