Krebs On Security
- A 24-year-old British national and senior member of the cybercrime group "Scattered Spider" has pleaded guilty to wire fraud conspiracy and aggravated identity theft. Tyler […]
- Microsoft today pushed software updates to fix a staggering 167 security vulnerabilities in its Windows operating systems and related software, including a SharePoint Server zero-day […]
- Hackers linked to Russia's military intelligence units are using known flaws in older Internet routers to mass harvest authentication tokens from Microsoft Office users, security […]
- An elusive hacker who went by the handle "UNKN" and ran the early Russian ransomware groups GandCrab and REvil now has a name and a […]
- A financially motivated data theft and extortion group is attempting to inject itself into the Iran war, unleashing a worm that spreads through poorly secured […]
- The U.S. Justice Department joined authorities in Canada and Germany in dismantling the online infrastructure behind four highly disruptive botnets that compromised more than three […]
Secure World
- In cybersecurity, we often look for comfort in the numbers. If total vulnerability counts are down, we assume the defense […]
- Last week, I posted an article about how AI makes us more efficient but actually makes us work more.
- For the better part of the last two years, the cybersecurity community has watched the National Vulnerability Database (NVD) with […]
- One week after Anthropic unveiled its Mythos frontier model — deployed in a controlled manner through Project Glasswing — OpenAI […]
- On March 26, 2026, a routine configuration error at Anthropic inadvertently left thousands of unpublished internal assets publicly accessible on […]
- As geopolitical tensions between the U.S., Israel, and Iran continue to simmer, the cybersecurity front has often been characterized by […]
Dark Reading
- The critical remote code execution flaw (CVE-2026-1731) in the remote monitoring and management tool can be exploited to spread ransomware […]
- The prompt injection vulnerability in the agentic AI product for filesystem operations was a sanitization issue that allowed for sandbox […]
- China is spying on India's financial sector, for some reason, and it's not putting much effort into it, judging by […]
- Stolen OAuth tokens, which are at the root of these breaches, "are the new attack surface, the new lateral movement," […]
- The OT devices that translate machine talk into Internet-speak are riddled with vulnerabilities and more frequently targeted for attacks, researchers […]
- Strangers can infer limited info about you without knowing or messaging you, which could theoretically aid certain kinds of malicious […]
