CYBERSECURITY

Amaranth-Dragon, a company connected to China, uses a WinRAR vulnerability in espionage operations

Amaranth-Dragon, a company connected to China, uses a WinRAR vulnerability in espionage operations

Throughout 2025, a new wave of cyberespionage campaigns targeting government and law enforcement agencies throughout Southeast Asia has been linked

Big Breach or Nada de Nada? Mexican Gov't Faces Leak Allegations

Big Breach or Nada de Nada? Mexican Gov't Faces Leak Allegations

After a hacktivist group leaked 2.3TB of data online, the information of over a quarter (28%) of Mexico's population may be at risk This article

Shadow DNS Malware Exploits Router Vulnerabilities To Intercept Internet Communications

Shadow DNS Malware Exploits Router Vulnerabilities To Intercept Internet Communications

DNS (Domain Name System) silently converts a website address into an IP address in the background when you type it into your browser This article

Developer Ecosystems Will Be Shattered by GlassWorm Malware Again

Developer Ecosystems Will Be Shattered by GlassWorm Malware Again

The GlassWorm threat has caused more supply chain chaos, contaminating software components with thousands of downstream users This article explores

One click at a time, dark patterns compromise security.

One click at a time, dark patterns compromise security.

"No reject" cookie banners This article explores concerns sneaky saas. . subscriptions with a free trial that are ridiculously hard to cancel.

When Cloud Outages Ripple Across the Internet

When Cloud Outages Ripple Across the Internet

It has been difficult overlook recent significant outages in cloud services This article explores outages cloud services.

Microsoft Office CVE-2026-21509 Is Used by APT28 in Espionage-Focused Malware Attacks

Microsoft Office CVE-2026-21509 Is Used by APT28 in Espionage-Focused Malware Attacks

Attacks using a recently revealed Microsoft Office security vulnerability have been linked to the Russia-affiliated state-sponsored threat actor

Attackers Use False PDF Lures to Gather Dropbox Logins

Attackers Use False PDF Lures to Gather Dropbox Logins

Using a multistage obfuscation technique, a new phishing scheme seeks to fool companies into disclosing their Dropbox logins.

Top 5 this week

Page 16 of 22