A widespread supply chain attack on the popular Nx build system has compromised dozens of high-traffic packages, exposing sensitive credentials…
A TransUnion data breach exposed 4.4 million US consumers’ Social Security numbers via a Salesforce hack. The attack is linked…
29 Aug From Pyramid of Pain to Pyramid of Influence: Rethinking the Analyst’s Role in the Human-Augmented SOC Posted at…
Continue reading online to avoid the email cutoff issue > Unsupervised Learning is a Security/AI newsletter about how to transition…
Since its emergence in February 2025, the NightSpire ransomware group has rapidly distinguished itself through a sophisticated double-extortion strategy that…
Cyber claims have continued their upwards trend over the past year, driven in large part by a rise in data…
A recently uncovered vulnerability in the Visual Studio Code (VS Code) Marketplace has allowed malicious actors to hijack discontinued extension…
An abandoned update server associated with input method editor (IME) software Sogou Zhuyin was leveraged by threat actors as part…
The Home Office sought access to data and messages stored by Apple users on its cloud storage in the UK…
I don’t have any insider knowledge—unless you count the >Information > article > that just leaked about a possible Her-like…
China’s reliance on domestic technology companies to carry out large-scale hacking operations—as highlighted by the U.S. government and its allies…
Microsoft has found no link between the August 2025 KB5063878 security update and customer reports of failure and data corruption issues…











