Cyber Security

BKA Identifies REvil Leaders Behind 130 German Ransomwa...

Germany's Federal Criminal Police Office (aka BKA or the Bundeskriminalamt) has ...

Product showcase: Proton Authenticator is an end-to-end...

Proton Authenticator is a free and open-source two-factor authentication (2FA) a...

Residential proxies make a mockery of IP-based defenses

Attack traffic moved through ordinary home and mobile connections in ways that l...

CISOs grapple with AI demands within flat budgets

Security spending continues to edge upward across large organizations, though th...

IT talent looks the other way as wireless security inci...

Enterprise wireless networks are supporting a growing mix of devices and applica...

$285 Million Drift Hack Traced to Six-Month DPRK Social...

Drift has revealed that the April 1, 2026, attack that led to the theft of $285 ...

Week in review: Axios npm supply chain compromise, crit...

Here’s an overview of some of last week’s most interesting news, articles, inter...

36 Malicious npm Packages Exploited Redis, PostgreSQL t...

Cybersecurity researchers have discovered 36 malicious packages in the npm regis...

Fortinet Patches Actively Exploited CVE-2026-35616 in F...

Fortinet has released out-of-band patches for a critical security flaw impacting...

FortiClient EMS zero-day exploited, emergency hotfixes ...

Defused Cyber has spotted a critical Fortinet FortiClient Endpoint Management Se...

Inconsistent Privacy Labels Don't Tell Users What They ...

Data privacy labels are a great idea for mobile apps, but the current versions j...

Apple Breaks Precedent, Patches DarkSword for iOS 18

Even organizations with users unwilling or unable to adopt iOS 26 can now protec...

China-Linked TA416 Targets European Governments with Pl...

A China-aligned threat actor has set its sights on European government and diplo...

Microsoft Details Cookie-Controlled PHP Web Shells Pers...

Threat actors are increasingly using HTTP cookies as a control channel for PHP-b...

Windows Security app gets Secure Boot certificate statu...

Microsoft’s Secure Boot certificates, issued in 2011, are approaching expiration...

Cisco IMC auth bypass vulnerability allows attackers to...

Cisco has fixed ten vulnerabilities affecting its Integrated Management Controll...