European Commission confirms data breach
Incident Overview The European Commission announced that it suffered a cyber‑attack affecting the cloud infrastructure that hosts the Commission’s web presence...
Incident Overview The European Commission announced that it suffered a cyber‑attack affecting the cloud infrastructure that hosts the Commission’s web presence...
Incident Overview Iran‑linked hackers breached the personal email inbox of FBI Director Kash Patel, publishing photographs and documents online, according to a...
Incident Overview The European Union’s top executive body has confirmed a cyberattack after hackers reportedly stole reams of data from its cloud storage. Euro...
Apple says it has no record of a successful spyware attack against any device running Lockdown Mode, the opt‑in security feature introduced in 2022. > “We are n...
Background The group, which Western researchers believe is “one of several personas used by Iranian government cyber‑intelligence units,” opposes U.S. support...
Leak Announcement A hacking group backed by the Iranian government dubbed “Handala” claimed on Friday that it has breached the personal email account of FBI di...
!iPhone Lockdown Modehttps://9to5mac.com/wp-content/uploads/sites/6/2022/08/iPhone-Lockdown-Mode.jpg?quality=82&strip=all&w=1500 iPhone security has been in the...
Article URL: https://www.reuters.com/world/us/iran-linked-hackers-claim-breach-of-fbi-directors-personal-email-doj-official-2026-03-27/ Comments URL: https://ne...
Almost four years after launching a security feature called Lockdown Mode, Apple says it has yet to see a case where someone’s device was hacked with these addi...
Hong Kong police gain warrantless power to force unlock of encrypted devices with jail time for refusal Your iPhone’s encryption means nothing if Hong Kong poli...
Cybersecurity researchers have disclosed details of a now‑patched bug impacting Open VSX's pre‑publish scanning pipeline, which allowed a malicious Microsoft Vi...
!https://www.bleepstatic.com/content/hl-images/2026/03/27/European_Union_flags.jpg Investigation Overview The European Commission, the European Union's main exe...
Threat actors are using adversary-in-the-middle AitM phishing pages to seize control of TikTok for Business accounts in a new campaign, according to a report fr...
Introduction: One tech power to rule them all is a thing of the past Rising geopolitical tensions are reflected or in some cases preceded by cyber operations,...
Overview A pro‑Ukrainian group called Bearlyfy has been attributed to more than 70 cyber attacks targeting Russian companies since it first surfaced in the thr...
A pro‑Ukrainian group called Bearlyfy has been attributed to more than 70 cyber attacks targeting Russian companies since it first surfaced in the threat landsc...
!https://www.bleepstatic.com/content/hl-images/2026/03/27/Dutch_Police.jpg The Dutch National Police Politie says a security breach resulting from a successful...
Cybersecurity researchers have disclosed three security vulnerabilities impacting LangChain and LangGraph that, if successfully exploited, could expose filesyst...
Introduction A cyber attack is not a single event—it is a process. Each stage presents an opportunity to detect, prevent, or mitigate damage. Awareness, prepar...
Background I used P3’s own site to find the tips page for my local Philly “fusion center,” clicked “continue,” and was immediately sent to the “Greater Kansas...
!https://www.bleepstatic.com/content/hl-images/2026/03/26/Ajax.jpg Incident overview Dutch professional football club Ajax Amsterdam AFC Ajax disclosed that a h...
Overview Hackers have found their way into a large number of internet e-commerce sites. This latest cybersecurityhttps://mashable.com/category/cybersecurity th...
A long-term and ongoing campaign attributed to a China‑nexus threat actor has embedded itself in telecom networks to conduct espionage against government networ...
The common assumption among iPhone security experts has been that finding vulnerabilities and developing exploits for iOS was difficult, requiring a lot of time...
The Telegram‑based Xinbi Guarantee black market sells services that help prop up scam operations. British officials have just hit the highly lucrative marketpla...
!https://www.bleepstatic.com/content/hl-images/2025/05/02/TikTok.jpg Overview Threat actors are targeting TikTok for Business accounts in a phishing campaign th...
US lawmakers are pressing Tulsi Gabbard to reveal whether using a VPN that connects to overseas servers can strip Americans of their constitutional protections...
Cybersecurity researchers have disclosed a vulnerability in Anthropic's Claude Google Chrome Extension that could have been exploited to trigger malicious promp...
!https://www.bleepstatic.com/content/hl-images/2025/06/16/law-enforcement-arrest-red.jpg Russian police in the Rostov region arrested a Taganrog resident believ...
Unmasking impostors is something the art world has faced for decades, and there are valuable lessons from the works of Elmyr de Hory that can apply to the world...
Most teams have security tools in place. Alerts are firing, dashboards look clean, threat intel is flowing in. On the surface, everything feels under control. B...
!https://cdn.byline.network/wp-content/uploads/2026/03/IT11.jpg 정부가 지난 24일 침해사고에 대한 기업 책임을 강화하는 ‘정보통신망 이용촉진 및 정보보호 등에 관한 법률정보통신망법’ 개정안과 디지털 취약계층 보호를 위한 ‘디지털 포용법...
!Hackinghttps://cdn.mos.cms.futurecdn.net/vxjuUgfLiBBpsbPbh5cmBT.jpg Image credit: Getty Images Introduction Self‑replicating software that infects machines in...
공개 보고된 보안 취약점이 늘어나면서 운영체제OS 패치 부담도 커지는 가운데, 레드햇이 기업들이 OS 패치를 더 쉽게 적용할 수 있는 방안을 제시했다. 한국레드햇은 25일 서울 여의도에서 열린 미디어 간담회에서 기업이 OS를 최신 상태로 유지할 수 있도록 지원하는 레드햇의 보안 전략을...
Cybersecurity researchers have discovered a new payment skimmer that uses WebRTC data channels as a means to receive payloads and exfiltrate data, effectively b...
Overview macOS Tahoe 26.4 introduces a new security feature that warns users when they paste certain potentially harmful commands into the Terminal app. What t...
!https://www.bleepstatic.com/content/hl-images/2026/03/25/phishing-bubble.jpg Threat actors evade phishing detection using Bubble Threat actors are evading phis...
!https://www.bleepstatic.com/content/hl-images/2022/09/03/data-theft.jpeg A new info‑stealing malware called Torg Grabber is stealing sensitive data from 850 br...
Arrest The alleged administrator of the LeakBase cybercrime forum has been arrested by Russian law enforcement authorities, state media reported Thursday. Acco...
!Russian Police officers walk during a snowstorm at Red Square, on February 16, 2026, in Moscow, Russia.https://techcrunch.com/wp-content/uploads/2026/03/russia...
Cybersecurity researchers have flagged a new evolution of the GlassWorm campaign that delivers a multi‑stage framework capable of comprehensive data theft and i...
As war reshapes the Gulf, the satellite infrastructure the world relies on to see conflict clearly is being delayed, spoofed, and privately controlled—and nobod...
!https://www.bleepstatic.com/content/hl-images/2026/03/25/Kali-Linux.jpg Kali Linux 2026.1, the first release of the year, is now available for download. It bri...
In September 2025, Anthropic disclosed that a state‑sponsored threat actor used an AI coding agent to execute an autonomous cyber‑espionage campaign against 30...
Sentencing The U.S. Department of Justice DoJ announced that a Russian national has been sentenced to two years in prison for managing a botnet used to launch...
Cybersecurity researchers are calling attention to an active device code phishing campaign that's targeting Microsoft 365 identities across more than 340 organi...
!https://www.bleepstatic.com/content/hl-images/2026/03/25/tp-link-router.jpg TP-Link patches critical router authentication bypass flaw TP‑Link has released fir...
!https://www.bleepstatic.com/content/hl-images/2026/03/25/Hacker_prison.jpg A Russian national has been sentenced to two years in prison after admitting that th...