- Coupang’s Breach Shows Why Insider Threat Detection and Forensics Matter
- WIRED Subscriber Database Leak Exposes 2.3 Million Records
- Nissan Data Breach 2025: What Happened and How to Respond
- Mercedes-Benz Hit by Massive Data Breach: Hackers Leak Sensitive Records
- Cyberattack Hits French Football Federation: Data Stolen
-
Moxa Switch Vulnerability: How to Mitigate Authentication Bypass Risk
Industrial networks are increasingly targeted by threat actors because they often bridge legacy operational technology (OT) … Moxa Switch Vulnerability: How to Mitigate Authentication Bypass RiskRead more
-
GlassWorm Malware: Supply Chain Attack Targeting VSX Developers
Software supply chain attacks are no longer rare, and the GlassWorm malware campaign proves how dangerous … GlassWorm Malware: Supply Chain Attack Targeting VSX DevelopersRead more
-
Notepad++ Update Mechanism Hijacked: How Attackers Delivered Malware to Users

In a striking example of software supply chain compromise, the widely used text editor Notepad++ had … Notepad++ Update Mechanism Hijacked: How Attackers Delivered Malware to UsersRead more
-
Moxa Switch Vulnerability: How to Mitigate Authentication Bypass Risk
Industrial networks are increasingly targeted by threat actors because they often bridge legacy operational technology (OT) … Moxa Switch Vulnerability: How to Mitigate Authentication Bypass RiskRead more
-
GlassWorm Malware: Supply Chain Attack Targeting VSX Developers
Software supply chain attacks are no longer rare, and the GlassWorm malware campaign proves how dangerous … GlassWorm Malware: Supply Chain Attack Targeting VSX DevelopersRead more
-
Notepad++ Update Mechanism Hijacked: How Attackers Delivered Malware to Users
In a striking example of software supply chain compromise, the widely used text editor Notepad++ had … Notepad++ Update Mechanism Hijacked: How Attackers Delivered Malware to UsersRead more