Differentiating Between a Targeted Intrusion and an Automated Opportunistic Scanning [Guest Diary], (Wed, Mar 4th) on March 4, 2026 Posted by SANS Internet Storm Center, InfoCON: green
Smashing Security podcast #457: How a cybersecurity boss framed his own employee on March 4, 2026 Posted by Graham Cluley
149 Hacktivist DDoS Attacks Hit 110 Organizations in 16 Countries After Middle East Conflict on March 4, 2026 Posted by The Hacker News
Coruna iOS Exploit Kit Uses 23 Exploits Across Five Chains Targeting iOS 13–17.2.1 on March 4, 2026 Posted by The Hacker News
Posted in Hacking news China’s Massistant Tool Secretly Extracts SMS, GPS Data, and Images From Confiscated Phones on July 18, 2025 The Hacker News
Posted in Hacking news UNG0002 Group Hits China, Hong Kong, Pakistan Using LNK Files and RATs in Twin Campaigns on July 18, 2025 The Hacker News
Posted in Hacking news Ivanti Zero-Days Exploited to Drop MDifyLoader and Launch In-Memory Cobalt Strike Attacks on July 18, 2025 The Hacker News
Posted in Hacking news CERT-UA Discovers LAMEHUG Malware Linked to APT28, Using LLM for Phishing Campaign on July 18, 2025 The Hacker News
Posted in Belgium Loaf and order: Belgian police launch bread-based cybersecurity campaign on July 18, 2025 Graham Cluley
Posted in Hacking news Google Sues 25 Chinese Entities Over BADBOX 2.0 Botnet Affecting 10M Android Devices on July 18, 2025 The Hacker News
Posted in Hacking news Critical NVIDIA Container Toolkit Flaw Allows Privilege Escalation on AI Cloud Services on July 18, 2025July 18, 2025 The Hacker News
Posted in Hacking news From Backup to Cyber Resilience: Why IT Leaders Must Rethink Backup in the Age of Ransomware on July 18, 2025 The Hacker News