$ page 2/34

Tech giants launch AI-powered ‘Project Glasswing’ to find critical software vulnerabilities

The OpenSSF, Google, and Anthropic are using AI models like Gemini and Claude to proactively find and fix security flaws in critical open-source softw

2 min readApr 13

Feds dismantle sprawling Russian GRU botnet that hijacked 18,000 routers for espionage

A detailed analysis of Operation Moonglow, the FBI takedown of a Russian GRU botnet that used custom malware on SOHO routers to steal Microsoft creden

6 min readApr 13

North Korean hackers spread over 1,700 malicious packages across major code registries

A North Korea-linked campaign has published over 1,700 malicious packages in multiple code registries, targeting developers using a wide array of lang

2 min readApr 13

Beyond the battlefield: Russia's relentless cyber war on Ukraine during the 2022 Easter truce

While a kinetic "Easter truce" was violated in 2022, Russia's cyber war against Ukraine intensified, targeting critical infrastructure with wipers and

7 min readApr 13

APT28 deploys advanced PRISMEX malware in new campaign against Ukraine and NATO allies

Russian state-sponsored actor APT28 is targeting Ukraine and NATO allies with PRISMEX, a new malware suite using steganography and COM hijacking.

6 min readApr 12

Passport numbers for more than 300,000 leaked during December Eurail data breach

Eurail.com suffered a major data breach, exposing passport numbers and other PII for over 300,000 customers after a hacker exploited an exposed API to

6 min readApr 12

Unsanctioned AI use creates new corporate security blind spots

Employees using unapproved AI tools are creating 'Shadow AI,' a major security risk involving data leaks, IP theft, and compliance violations.

2 min readApr 12

Microsoft finds vulnerability exposing millions of Android crypto wallet users

A vulnerability in a third-party SDK used by major Android crypto apps exposed millions of users to data theft, according to Microsoft researchers.

2 min readApr 12

Attackers exploit 80% of critical vulnerabilities before patches are applied, study finds

A Qualys analysis of 1 billion records finds attackers exploit 80% of CISA KEVs before defenders can patch, showing human-scale security is failing.

2 min readApr 12

Nearly 4,000 US industrial devices are exposed to Iranian cyberattacks

An attack on a US water facility revealed a graver threat: nearly 4,000 industrial controllers are exposed online, making them easy targets for Irania

6 min readApr 12

Ukraine's shadow war: Zelenskyy claims Iranian drone shootdowns in the Middle East

President Zelenskyy's claim of downing Iranian drones in the Middle East signals Ukraine's shift from a defense recipient to a global security exporte

6 min readApr 12

Beyond the headlines: How nation-states weaponize opinion in the digital age

Public opinion polls reflect a moment in time, but nation-states now use sophisticated cyber tactics to actively shape those views as a form of modern

5 min readApr 12