UNC1069 Social Engineering of Axios Maintainer Led to npm Supply Chain Attack on April 3, 2026 Posted by The Hacker News
Why Third-Party Risk Is the Biggest Gap in Your Clients’ Security Posture on April 3, 2026 Posted by The Hacker News
Nigerian romance scammer jailed after being caught out by fellow fraudster on April 3, 2026 Posted by Graham Cluley
Posted in Hacking news CISA Flags VMware Zero-Day Exploited by China-Linked Hackers in Active Attacks on October 31, 2025 The Hacker News
Posted in Hacking news A New Security Layer for macOS Takes Aim at Admin Errors Before Hackers Do on October 30, 2025 The Hacker News
ISC Stormcast For Friday, October 31st, 2025 https://isc.sans.edu/podcastdetail/9680, (Fri, Oct 31st) on October 30, 2025 SANS Internet Storm Center, InfoCON: green
Posted in BRONZE BUTLER BRONZE BUTLER exploits Japanese asset management software vulnerability on October 30, 2025 mindimcdowell
Posted in Hacking news Google’s Built-In AI Defenses on Android Now Block 10 Billion Scam Messages a Month on October 30, 2025 The Hacker News
Posted in Hacking news Russian Ransomware Gangs Weaponize Open-Source AdaptixC2 for Advanced Attacks on October 30, 2025 The Hacker News
Posted in Guest blog Spam text scammer fined £200,000 for targeting people in debt, after sending nearly one million messages on October 30, 2025 Graham Cluley
Posted in Afghanistan The human cost of the UK Government’s Afghan data leak on October 30, 2025 Graham Cluley
Posted in Hacking news New “Brash” Exploit Crashes Chromium Browsers Instantly with a Single Malicious URL on October 30, 2025 The Hacker News
BRONZE BUTLER exploits Japanese asset management software vulnerability on October 30, 2025 Category: Threat Research