New “LeakyLooker” Flaws in Google Looker Studio Could Enable Cross-Tenant SQL Queries on March 10, 2026 Posted by The Hacker News
How to Stop AI Data Leaks: A Webinar Guide to Auditing Modern Agentic Workflows on March 10, 2026 Posted by The Hacker News
The Zero-Day Scramble is Avoidable: A Guide to Attack Surface Reduction on March 10, 2026 Posted by The Hacker News
Posted in Conti Notorious ransomware gang allegedly blackmailed by fake FSB officer on February 26, 2026 Graham Cluley
Posted in Ransomware Naming and shaming: How ransomware groups tighten the screws on victims on February 12, 2026 WeLiveSecurity
Posted in Allison Nixon Please Don’t Feed the Scattered Lapsus ShinyHunters on February 2, 2026 BrianKrebs
Posted in ClickFix I am not a robot: ClickFix used to deploy StealC and Qilin on December 18, 2025 Mindi McDowell
Posted in Amazon Smashing Security podcast #448: The Kindle that got pwned on December 17, 2025 Graham Cluley
Posted in Cybercrime GOLD SALEM tradecraft for deploying Warlock ransomware on December 11, 2025 Mindi McDowell
Posted in FinCEN Ransomware may have extorted over $2.1 billion between 2022-2024, but it’s not all bad news, claims FinCEN report on December 10, 2025 Graham Cluley
Posted in Conti Four years later, Irish health service offers €750 to victims of ransomware attack on December 10, 2025 Graham Cluley
Posted in EDR killer Inside Shanya, a packer-as-a-service fueling modern attacks on December 6, 2025 Gabor Szappanos