June 2025 breach forces UNFI to take critical systems offline, triggering order backlogs, an FBI investigation, and scrutiny of critical infrastructure.
Deep dive into call screening, messages filtering, on-device AI, PCC, and promised RCS encryption - what they mean for security and privacy
Analysis of leaked builds, chat logs and wallet tables uncovers how new affiliates fuel global ransomware attacks.
How attackers use clipboard PowerShell stagers and brand-spoofed links to bypass macros and drop a .NET RAT.
Treasury’s May 29 action freezes Funnull’s IP pools and prefab scam kits. An estimated $200 million in U.S. losses tied to this turnkey infrastructure provider.
Analysis of the May 28 breach shows tight scope but zero transparency. Here’s what MSPs must do to validate their defenses.
Analysis of UNC6032’s Facebook and LinkedIn ad blitz shows social-engineered ZIPs leading to multi-stage Python and DLL side-loading toolkits
The new Microsoft report links the Russia-backed group to cookie-theft proxies and mass mailbox exports across critical sectors in Europe and North America.
Microsoft Seizes 2,300 Lumma Stealer Domains in Global Takedown. Here's what you need to know.
The two vulnerabilities can be chained together to gain RCE
The new malware is called LOSTKEYS and is designed to steal files from a number of different directories
In a new advisory, the agencies–including the Environmental Protection Agency and Department of Energy–said that they are seeing an uptick in the number of attacks against OT networks by non-APT teams