Trigona Ransomware Employs Unique Exfiltration Tool

Trigona Ransomware Group Shifts Tactics with Custom Data Exfiltration Tool In March 2026, the Trigona ransomware group unveiled a significant evolution in its operational tactics,...

Rituals Reveals Data Breach – CyberMaterial

Data Breach at Rituals: Customer Information Compromised Luxury cosmetics brand Rituals has recently confirmed a significant data breach impacting its My Rituals membership program. This incident raises serious concerns about the ongoing challenges faced by companies in protecting customer data from relentless cyber threats. The breach...

Checkmarx Supply Chain Security Breach

Checkmarx Reports Supply Chain Security Incident Affecting Several Products Checkmarx, a notable player in the...

Hackers Exploit Ollama Model Uploads to Expose Server Data

Cybersecurity Researchers Identify Critical Vulnerability in Ollama Open-Source Platform Cybersecurity researchers have uncovered a significant...

Trigona Ransomware Employs Unique Exfiltration Tool

Trigona Ransomware Group Shifts Tactics with Custom Data Exfiltration Tool In March 2026, the Trigona...

Rituals Reveals Data Breach – CyberMaterial

Data Breach at Rituals: Customer Information Compromised Luxury cosmetics brand Rituals has recently confirmed a...

Cyber Attacks in the Education Sector Surge by 63%

Surge in Cyberattacks Targeting Educational Institutions: A Growing Concern for Global Security Educational institutions around...

Trigona Ransomware Employs Unique Exfiltration Tool

Trigona Ransomware Group Shifts Tactics with Custom Data Exfiltration Tool In March 2026, the Trigona ransomware group unveiled a significant evolution in its operational tactics,...

Checkmarx Supply Chain Security Breach

Checkmarx Reports Supply Chain Security Incident Affecting Several Products Checkmarx, a notable player in the...

Hackers Exploit Ollama Model Uploads to Expose Server Data

Cybersecurity Researchers Identify Critical Vulnerability in Ollama Open-Source Platform Cybersecurity researchers have uncovered a significant...

Checkmarx Supply Chain Security Breach

Checkmarx Reports Supply Chain Security Incident Affecting Several Products Checkmarx, a notable player in the...
spot_img

Cyber Balkans

Keeper Security Secures Minority Growth Equity Investment from Summit Partners

Cybersecurity firm Keeper Security has secured a significant minority investment from global growth equity...

What is a Passkey?

Passkeys continue their rise in popularity as an alternative form of user authentication that...

ProofPoint Report: Cybersecurity Stress Resurfaces Following a Brief Calm

A recent survey conducted by cybersecurity firm ProofPoint has revealed that 68% of Chief...

Methods for detecting PaperCut vulnerabilities are circumventable, and Iranian cyber attackers are now involved. A fresh breed of ransomware uses VPNs to penetrate its...

PaperCut vulnerability detection methods have recently been discovered to be easily bypassed, allowing hackers...

Advancements in AI Cybersecurity: Utilizing ChatGPT to Remain Ahead of Cyber Criminals

The field of cybersecurity has rapidly evolved in recent times as the world becomes...

Trigona Ransomware Employs Unique Exfiltration Tool

Trigona Ransomware Group Shifts Tactics with Custom Data Exfiltration Tool In March 2026, the Trigona...

Rituals Reveals Data Breach – CyberMaterial

Data Breach at Rituals: Customer Information Compromised Luxury cosmetics brand Rituals has recently confirmed a...

Checkmarx Supply Chain Security Breach

Checkmarx Reports Supply Chain Security Incident Affecting Several Products Checkmarx, a notable player in the...

Delilah Schwartz from Cybersixgill Talks About the Evolving Dark Web and New Threats from ChatGPT and Other AI Technologies.

Delilah Schwartz, a cyber threat analyst from Cybersixgill, has recently given an insightful interview...

What is a Passkey?

Passkeys continue their rise in popularity as an alternative form of user authentication that...

ProofPoint Report: Cybersecurity Stress Resurfaces Following a Brief Calm

A recent survey conducted by cybersecurity firm ProofPoint has revealed that 68% of Chief...

Salt Security collaborates with leading API testing experts in IT security

Salt Security has launched its Salt Technical Ecosystem Partner (STEP) program, aimed at helping...

Risk and Repeat: Are data extortion attacks equivalent to ransomware?

The threat landscape of ransomware has undergone significant changes, leading to a transformation in...

Keeper Security Secures Minority Growth Equity Investment from Summit Partners

Cybersecurity firm Keeper Security has secured a significant minority investment from global growth equity...

Malware

CISA Adds Four Exploited Flaws to KEV and Establishes May 2026 Federal Deadline

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) recently announced a significant update to its Known Exploited Vulnerabilities (KEV) catalog. On Friday, CISA included four critical vulnerabilities affecting widely used software and hardware, specifically focusing on SimpleHelp, Samsung MagicINFO 9 Server, and the D-Link...

Nokoyawa Ransomware Exploits Windows Zero Day Vulnerabilities

A report released by Kaspersky Labs recently shed light on a threat actor that...

PEGA Committee Advocates for Restrictions on Commercial Spyware

The European Parliament committee investigating the abuse of commercial spyware tools such as Pegasus...

Poor Risk Analysis Costs Four Firms $1.7 Million in HIPAA Fines

HHS OCR Breach Investigators Identify Recurring Issues with Risk Analysis Failures In a significant revelation,...

TekStream Aims for Proactive Security Through Acquisition of ImagineX Cyber

Acquisition Enhances TekStream's Cybersecurity Portfolio and Strategy In a significant move within the cybersecurity sector,...
spot_img

RISK MANAGEMENTS

UK Confronts a Cyber Perfect Storm

A Perfect Storm for Cybersecurity in the UK The United Kingdom finds itself confronting a distinctly precarious landscape in the realm of cybersecurity, a situation...

Explaining the Difference between Symmetric and Asymmetric Encryption

Data is one of the most valuable assets for any organization today. The vast...

Surge in Silent Subject Phishing Campaigns Targeting VIP Users

A notable increase in phishing emails without subject lines has emerged as part of a broader initiative aimed at targeting high-value users, as recognized by Cyberproof, a leading cybersecurity firm. This phenomenon, referred to as silent subject or null subject phishing, exploits vulnerabilities not...

Scattered Spider Co-Conspirator Pleads Guilty

Scattered Spider Group: A Growing Threat in Cybersecurity The landscape of cybersecurity continues to evolve, with the notorious Scattered Spider group remaining a prominent threat...

Cyber Architecture

Trigona Ransomware Employs Unique Exfiltration Tool

Trigona Ransomware Group Shifts Tactics with Custom Data Exfiltration Tool In March 2026, the Trigona...

Rituals Reveals Data Breach – CyberMaterial

Data Breach at Rituals: Customer Information Compromised Luxury cosmetics brand Rituals has recently confirmed a...

CISA Takes Final Spot for Access to Anthropic Mythos

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) currently finds itself in a precarious...

NCSC Supports Passkeys, Signaling a New Era of Sign-in

UK's National Cyber Security Centre Endorses Passkeys as the Preferred Login Method The National Cyber...

FIFA World Cup 2026: Over One-Third of Official Partners Expose Public to Email Fraud Risks

Email Security Analysis Highlights Risks Ahead of FIFA World Cup 2026 In a recent analysis conducted by cybersecurity firm Proofpoint, alarming statistics reveal that a significant portion of the partners involved in the upcoming FIFA World Cup 2026 lacks adequate email security measures to combat...

All articles

Trigona Ransomware Employs Unique Exfiltration Tool

Trigona Ransomware Group Shifts Tactics with Custom Data Exfiltration Tool In March 2026, the Trigona...

Rituals Reveals Data Breach – CyberMaterial

Data Breach at Rituals: Customer Information Compromised Luxury cosmetics brand Rituals has recently confirmed a...

Checkmarx Supply Chain Security Breach

Checkmarx Reports Supply Chain Security Incident Affecting Several Products Checkmarx, a notable player in the...

Hackers Exploit Ollama Model Uploads to Expose Server Data

Cybersecurity Researchers Identify Critical Vulnerability in Ollama Open-Source Platform Cybersecurity researchers have uncovered a significant...

Cyber Attacks in the Education Sector Surge by 63%

Surge in Cyberattacks Targeting Educational Institutions: A Growing Concern for Global Security Educational institutions around...

CISA Adds Four Exploited Flaws to KEV and Establishes May 2026 Federal Deadline

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) recently announced a significant update to...

Python Vulnerability Allows Out-of-Bounds Write on Windows

High-Severity Vulnerability Discovered in Python’s asyncio Module for Windows A significant security vulnerability has been...

Hackers Exploit PowerShell Script to Hijack Telegram Accounts

Cybercriminals have recently adopted a novel approach to hijack Telegram sessions, utilizing a PowerShell...

Void Dokkaebi Hackers Distribute Malware via Phony Job Interviews

Title: Evolving Cyber Threat: Void Dokkaebi's Large-Scale Malware Campaign Through Fake Job Interviews Void Dokkaebi,...

Fake CAPTCHA Scam Sparks SMS Fraud

Emerging Threat: Cybercriminals Exploit Fake CAPTCHA Pages for SMS Fraud In a concerning development in...

Xiongmai IP Camera Vulnerability Allows Attackers to Bypass Authentication

Critical Security Vulnerability in Hangzhou Xiongmai Technology’s XM530 IP Cameras Poses Significant Risks to...