Learn about the sophisticated supply chain attack involving a trojanized version of jQuery discovered by Phylum, affecting npm, GitHub, and jsDelivr. ...
Shopify denies hack claims; customer data breach blamed on third-party app. Discover the full analysis of this critical cybersecurity incident....
Roblox's latest data breach exposes 10,386 accounts from RDC attendees. Dive into our critical security analysis to understand the impact and future precautions....
Explore the alarming rise of packet rate DDoS attacks targeting network core devices like MikroTik routers. Learn how a record-breaking 840 million PPS attack on OVHcloud exposed vulnerabilities...
Explore the detailed analysis of the Ethereum mailing list breach and phishing attack, including response strategies and security measures to protect crypto assets...
Prudential Financial's February breach exposed 2.5M records. ALPHV ransomware gang claimed responsibility. Discover the incident's detailed analysis. ...
Discover how the Indirector BTI attack targets Intel's Raptor and Alder Lake CPUs, exploiting IBP and BTB flaws to steal sensitive data. Mitigation strategies included....
A severe OpenSSH vulnerability, regreSSHion, allows unauthenticated RCE, risking root access on millions of Linux servers. Immediate patching required...
Polyfill.io relaunches on a new domain after being accused of delivering malicious code to 100,000+ sites. Explore the security implications and industry impact....
Discover the latest critical vulnerabilities in MOVEit Transfer. Learn about CVE-2024-5806 and CVE-2024-5805, their impact, and essential mitigation steps....
Sign up to our Weekley Threat Digest and keep apace of the trends shaping Cybersecurity.