In a striking example of software supply chain compromise, the widely used text editor Notepad++ had … Notepad++ Update Mechanism Hijacked: How Attackers Delivered Malware to UsersRead more
cloud security
Windows 11 Security Feature Strengthens System File Protection
In modern cyber incidents, attackers don’t always start with malware or zero-days — sometimes, they start … Windows 11 Security Feature Strengthens System File ProtectionRead more
European Email Alternatives: Secure Options Beyond Big Tech
Email is still the backbone of digital identity. From SaaS logins to password resets and enterprise … European Email Alternatives: Secure Options Beyond Big TechRead more
Threat Actor Collaboration: Why Defenders Are Falling Behind
Threat actor collaboration is no longer theoretical — it’s actively reshaping the global cyber threat landscape. … Threat Actor Collaboration: Why Defenders Are Falling BehindRead more
Cyber Attacks on Energy Infrastructure: Lessons from CERT Polska’s Renewable Energy Incident
On December 29, 2025, coordinated cyber attacks on energy infrastructure quietly unfolded across Poland—targeting more than … Cyber Attacks on Energy Infrastructure: Lessons from CERT Polska’s Renewable Energy IncidentRead more
Vishing Attacks on SaaS Platforms: How ShinyHunters Is Bypassing MFA at Scale
In early 2026, Google-owned Mandiant identified a sharp escalation in vishing attacks on SaaS platforms, where … Vishing Attacks on SaaS Platforms: How ShinyHunters Is Bypassing MFA at ScaleRead more
Google Disrupts Massive Residential Proxy Networks Abusing User Devices
Residential proxy networks have quietly become one of the most abused infrastructures in modern cybercrime—and most … Google Disrupts Massive Residential Proxy Networks Abusing User DevicesRead more
175K Exposed Ollama Hosts Pose Severe Remote Code Execution Risks
Imagine a network of 175,000 AI servers, scattered across 130 countries, operating without security guardrails. Over … 175K Exposed Ollama Hosts Pose Severe Remote Code Execution RisksRead more
Discord Clipboard Hijacker Stealing Crypto via Social Engineering
In late 2025, threat intelligence teams uncovered a Discord clipboard hijacker campaign that quietly drained cryptocurrency … Discord Clipboard Hijacker Stealing Crypto via Social EngineeringRead more
Malicious File Converter Apps: How Free Tools Infect Systems
In 2024 alone, initial access via trojanized software accounted for a growing share of enterprise malware … Malicious File Converter Apps: How Free Tools Infect SystemsRead more