April 9, 2026
Categories
Iranian attacks on US critical infrastructure puts 3,900 devices in crosshairs
Skip to main content Censys researchers warned that thousands of…
Why is the timeline to quantum-proof everything constantly shrinking?
Skip to main content Experts say advancements in hardware, mathematics…
Inside the FBI’s router takedown that cut off APT28’s ‘tremendous access’
Skip to main content FBI cyber chief Brett Leatherman told…
Don’t just fight fraud, hunt it
Skip to main content As traditional fraud markers become obsolete,…
New ‘LucidRook’ malware used in targeted attacks on NGOs, universities
A new Lua-based malware, called LucidRook, is being used in…
New VENOM phishing attacks steal senior executives’ Microsoft logins
Threat actors using a previously undocumented phishing-as-a-service (PhaaS) platform called…
Healthcare IT solutions provider ChipSoft hit by ransomware attack
Dutch healthcare software vendor ChipSoft has been impacted by a…
Google Chrome adds infostealer protection against session cookie theft
Google has rolled out Device Bound Session Credentials (DBSC) protection…
Smart Slider updates hijacked to push malicious WordPress, Joomla versions
Hackers hijacked the update system for the Smart Slider 3…
When attackers already have the keys, MFA is just another door to open
The Figure breach exposed 967,200 email records without a single…