Identity Prioritization isn’t a Backlog Problem – It’s a Risk Math Problem on February 24, 2026 Posted by The Hacker News
Lazarus Group Uses Medusa Ransomware in Middle East and U.S. Healthcare Attacks on February 24, 2026 Posted by The Hacker News
UnsolicitedBooker Targets Central Asian Telecoms With LuciDoor and MarsSnake Backdoors on February 24, 2026 Posted by The Hacker News
Posted in data breach Heart monitor manufacturer hit by cyberattack, takes systems offline on July 27, 2023 Graham Cluley
Posted in data breach SEC requires firms to report cyberattacks within 4 days, but not everyone may like it on July 27, 2023 Graham Cluley
Posted in data breach SEC requires firms to report cyberattacks within 4 days, but not everyone may like it on July 27, 2023 Graham Cluley
Posted in Hacking news GameOver(lay): Two Severe Linux Vulnerabilities Impact 40% of Ubuntu Users on July 27, 2023 The Hacker News
Posted in Hacking news New Malvertising Campaign Distributing Trojanized IT Tools via Google and Bing Search Ads on July 27, 2023 The Hacker News
Posted in Hacking news The 4 Keys to Building Cloud Security Programs That Can Actually Shift Left on July 27, 2023 The Hacker News
Posted in Hacking news Hackers Target Apache Tomcat Servers for Mirai Botnet and Crypto Mining on July 27, 2023 The Hacker News
Posted in Hacking news Group-IB Co-Founder Sentenced to 14 Years in Russian Prison for Alleged High Treason on July 27, 2023 The Hacker News
Posted in Hacking news New SEC Rules Require U.S. Companies to Reveal Cyber Attacks Within 4 Days on July 26, 2023 The Hacker News
Posted in AI Smashing Security podcast #332: Nudes leak at the plastic surgery, Mali mail mix-up, and WormGPT on July 26, 2023 Graham Cluley