Russian Spies Pack Custom Malware Into Hidden VMs on Windows Machines
Operation SkyCloak Deploys Tor-Enabled OpenSSH Backdoor Targeting Defense Sectors
Data Brokers Selling Location Info That Can Be Used to Track EU Officials, Report Finds
Europe Sees Increase in Ransomware, Extortion Attacks
A Cybercrime Merger Like No Other — Scattered Spider, LAPSUS$, and ShinyHunters Join Forces
DragonForce Cartel Emerges as Conti-Derived Ransomware Threat
Lawmakers Say Stolen Police Logins Are Exposing Flock Surveillance Cameras to Hackers
FBI Warns of Criminals Posing as ICE, Urges Agents to ID Themselves
Treasury Sanctions 8 for Laundering North Korea Earnings From Cybercrime, IT Worker Scheme
Europol and Eurojust Dismantle €600 Million Crypto Fraud Network in Global Sweep
French Police Seize €1.6m Amid Crypto Scam Network Crackdown
Health Privacy Bill Seeks Protections for Data Collected by Apps, Smartwatches | Data Breach at Major Swedish Software Supplier Impacts 1.5 Million
Media Giant Nikkei Reports Data Breach Impacting 17,000 People
Polish Loan Platform Hacked; Mobile Payment System and Other Businesses Disrupted
Hundreds of South Gloucestershire Residents’ Details Shared in Data Breach
Penn Data Breach Involves Decades of Student and Alumni Information
Apache OpenOffice Disputes Data Breach Claims by Akira Ransomware Gang
Malicious Android Apps on Google Play Downloaded 42 Million Times
Microsoft Teams Bugs Let Attackers Impersonate Colleagues and Edit Messages Unnoticed
Hackers Exploit WordPress Plugin Post SMTP to Hijack Admin Accounts
Hackers Exploit Critical Auth Bypass Flaw in JobMonster WordPress Theme
Google’s AI ‘Big Sleep’ Finds 5 New Vulnerabilities in Apple’s Safari WebKit
Microsoft Removing Defender Application Guard From Office |