April 22, 2025
Categories
W
A security architect with the National Labor Relations Board (NLRB)…
Attackers stick with effective intrusion points, valid credentials and exploits
Skip to main content Voting is open for the 2025…
Judge limits evidence about NSO Group customers, victims in damages trial
Skip to main content Voting is open for the 2025…
Multiple top CISA officials behind ‘Secure by Design’ resign 
Skip to main content Voting is open for the 2025…
Microsoft Entra account lockouts caused by user token logging mishap
Microsoft confirms that the weekend Entra account lockouts were caused by the…
WordPress ad-fraud plugins generated 1.4 billion ad requests per day
A large-scale ad fraud operation called 'Scallywag' is monetizing pirating…
Phishers abuse Google OAuth to spoof Google in DKIM replay attack
In a rather clever attack, hackers leveraged a weakness that…
State-sponsored hackers embrace ClickFix social engineering tactic
ClickFix attacks are gaining traction among threat actors, with multiple…
Bug hunter tricked SSL.com into issuing cert for Alibaba Cloud domain in 5 steps
Certificate issuer SSL.com’s domain validation system had an unfortunate bug…