Daily Security Review
Episodes
AI-Powered Polymorphic Phishing: The New Era of Social Engineering
28 Aug 2025
Contributed by Lukas
Cybercrime is entering a new phaseâone marked by AI-powered phishing attacks, the weaponization of legitimate remote access tools, and the rise of p...
Salesforce Breach: How OAuth Token Theft Exposed Hundreds of Organizations
28 Aug 2025
Contributed by Lukas
The recent Salesforce data breach underscores a growing reality in cybersecurity: even when core SaaS platforms are secure, their third-party integrat...
Silk Typhoonâs Fake Adobe Update: How China-Backed Hackers Target Diplomats
28 Aug 2025
Contributed by Lukas
A new and highly sophisticated cyber espionage campaign attributed to Silk Typhoonâalso known as Mustang Panda, TEMP.Hex, or UNC6384âhas been unco...
FTC Warns Tech Giants: Donât Weaken Encryption for Foreign Governments
27 Aug 2025
Contributed by Lukas
The fight over encryption has entered a new phase. The Federal Trade Commission (FTC), led by Chairman Andrew Ferguson, has issued a strong warning to...
Invisible Prompts: How Image Scaling Attacks Break AI Security
27 Aug 2025
Contributed by Lukas
Researchers have uncovered a new form of indirect prompt injection that leverages a simple but powerful trick: image scaling. This novel attack involv...
Healthcare Services Group Breach Exposes 624,000 Individualsâ Sensitive Data
27 Aug 2025
Contributed by Lukas
The healthcare sector has been rocked yet again by a massive cybersecurity incident. Healthcare Services Group (HCSG), a provider of dining and laundr...
Auchan Data Breach: Hundreds of Thousands of Loyalty Accounts Compromised
27 Aug 2025
Contributed by Lukas
French retail giant Auchan has confirmed a massive data breach that compromised the personal details of hundreds of thousands of customers. The stolen...
Docker Desktop Vulnerability: Why Containers Arenât as Safe as You Think
27 Aug 2025
Contributed by Lukas
A critical vulnerability in Docker Desktop, CVE-2025-9074, has shaken the container security world. Scoring 9.3 on the CVSS scale, this flaw exposed a...
Arch Linux Website, Forums, and AUR Targeted in Sustained Cyber Assault
26 Aug 2025
Contributed by Lukas
The Arch Linux community has just endured more than a week of turbulence as a massive distributed denial-of-service (DDoS) attack disrupted its most c...
Data I/O Ransomware Attack: Supply Chain Cybersecurity in Crisis
26 Aug 2025
Contributed by Lukas
Cyberattacks against supply chains are no longer isolated disruptionsâthey are systemic threats with the power to cascade across industries and nati...
BianLian Ransomware Strikes Aspire Rural Health: 138,000 Patients Exposed
26 Aug 2025
Contributed by Lukas
The U.S. healthcare sector continues to face relentless cyberattacks, and rural hospitals are increasingly at the center of this crisis. The recent As...
OneFlip: How a Single Bit-Flip Can Hack AI Models
26 Aug 2025
Contributed by Lukas
Artificial Intelligence (AI) models are shaping the future of industries from healthcare and finance to autonomous vehicles and national infrastructur...
PyPI Cracks Down on Domain Expiration Attacks to Protect Python Packages
21 Aug 2025
Contributed by Lukas
The Python Package Index (PyPI), the backbone of the global Python ecosystem, has rolled out new security safeguards aimed at stopping a dangerous for...
AI Joins the Fight Against Exploits: Google and Mozilla Patch Dangerous Vulnerabilities
20 Aug 2025
Contributed by Lukas
Both Google and Mozilla have rolled out urgent security updates to patch multiple high-severity vulnerabilities in their flagship browsersâGoogle Ch...
Britain Backs Down: UK Drops Encryption Backdoor Demand on Apple
20 Aug 2025
Contributed by Lukas
A major international clash over encryption has come to a dramatic resolution. Earlier this year, the U.K. government, acting under its controversial ...
PipeMagic Backdoor: How Ransomware Actors Exploited a Windows Zero-Day
20 Aug 2025
Contributed by Lukas
In early 2025, Microsoft and security researchers uncovered PipeMagic, a modular and memory-resident backdoor that has been quietly leveraged in ranso...
270,000 Intel Employee Records at Risk from Authentication Bypass and Hardcoded Credentials
20 Aug 2025
Contributed by Lukas
In late 2024, Intel faced a major cybersecurity wake-up call when security researcher Eaton Zveare uncovered a series of vulnerabilities inside the co...
How Social Engineering and Vendor Weaknesses Led to Allianz Lifeâs Massive Breach
20 Aug 2025
Contributed by Lukas
In July 2025, Allianz Life Insurance Company of North America confirmed a data breach impacting over 1.1 million customers, financial professionals, a...
Cloud Computing Heist: $3.5 Million Fraud Leads to Prison for Fake Crypto Influencer
19 Aug 2025
Contributed by Lukas
The U.S. Department of Justice has closed the chapter on one of the most audacious cloud fraud and cryptojacking schemes in recent years. Charles O. P...
Embassy Espionage: Kimsuky and Suspected Chinese Partners Deploy XenoRAT in Seoul
19 Aug 2025
Contributed by Lukas
A new wave of state-sponsored cyber espionage is sweeping across South Korea, targeting foreign embassies through highly tailored, multi-stage spearph...
GSMA Confirms Flaws: Researchers Unveil Dangerous 5G Sniffing and Injection Attack
19 Aug 2025
Contributed by Lukas
A groundbreaking security study from the Singapore University of Technology and Design has revealed a major vulnerability in 5G networks that allows a...
SAP NetWeaver Under Siege: New Exploit Chains Threaten Global Enterprises
19 Aug 2025
Contributed by Lukas
SAP NetWeaver, one of the worldâs most critical enterprise platforms, is under active attack from both ransomware groups and state-backed hackers. A...
Ransomware Gangs Deploy Kernel-Level EDR Killers to Evade Detection
19 Aug 2025
Contributed by Lukas
Ransomware gangs are no longer just encrypting files and demanding paymentâthey are actively targeting the very defenses meant to stop them. Recent ...
Chinese APTs Target Taiwan: UAT-7237âs SoundBill Loader and Gelsemiumâs FireWood Backdoor
18 Aug 2025
Contributed by Lukas
Taiwan continues to face an unprecedented wave of cyberattacks, with new intelligence exposing two distinct but sophisticated campaigns linked to Chin...
Colt Cyberattack: Multi-Day Outages After WarLock Ransomware Exploited SharePoint Zero-Day
18 Aug 2025
Contributed by Lukas
Colt Technology Services, a major UK-based telecommunications provider with operations in over 40 countries, has confirmed that the WarLock ransomware...
Workday Breach Tied to Third-Party CRM Hack in ShinyHunters Campaign
18 Aug 2025
Contributed by Lukas
Workday, one of the worldâs leading providers of human resources and financial management software, has confirmed a data breach that exposed busines...
DOJ Brings Down Zeppelin Ransomware Operator, Seizes Millions in Crypto
18 Aug 2025
Contributed by Lukas
The U.S. Department of Justice has successfully dismantled a major operator behind the notorious Zeppelin ransomware, charging Russian national Ianis ...
U.S. Sanctions Grinex, the Russian Crypto Exchange Born from Garantexâs Ashes
16 Aug 2025
Contributed by Lukas
The U.S. Department of the Treasury has announced sweeping sanctions against Grinex, a Russian-linked cryptocurrency exchange identified as the direct...
Canadian House of Commons Breach Tied to Microsoft SharePoint Zero-Day
15 Aug 2025
Contributed by Lukas
On August 8th, 2025, hackers breached the Canadian House of Commons by exploiting a critical Microsoft SharePoint zero-day vulnerabilityâCVE-2025-53...
Norwegian Authorities Blame Pro-Russian Hackers for Critical Infrastructure Breach
15 Aug 2025
Contributed by Lukas
In April 2025, Norway experienced a chilling reminder of the risks facing its critical infrastructure when pro-Russian hackers took control of the Lak...
MadeYouReset: New HTTP/2 Flaw Could Unleash Massive DDoS Storms
15 Aug 2025
Contributed by Lukas
A newly disclosed HTTP/2 vulnerabilityâdubbed MadeYouReset (CVE-2025-8671)âis making waves across the cybersecurity community for its potential to...
Cybersecurity Budgets Hit Historic Slowdown as Global Tensions Mount
15 Aug 2025
Contributed by Lukas
Global cybersecurity strategies are being tested like never before as organizations face the dual pressure of escalating cyber threats and shrinking b...
CVE-2025-53786: The Microsoft Exchange Hybrid Flaw That Could Take Down Your Domain
14 Aug 2025
Contributed by Lukas
A critical security flaw, tracked as CVE-2025-53786, is putting tens of thousands of organizations at risk â and U.S. federal agencies are under ord...
Allianz Life Breach: 2.8 Million Records Leaked in Salesforce Hack
14 Aug 2025
Contributed by Lukas
On July 16, 2025, Allianz Life Insurance Company of North America confirmed a major data breach that exposed up to 2.8 million sensitive records belon...
Charon Ransomware Targets Middle East Government and Aviation Sectors
13 Aug 2025
Contributed by Lukas
A newly discovered ransomware family named Charon is making waves in the cybersecurity world â and not for good reasons. Targeting government agenci...
August 2025 Patch Tuesday: Microsoft and Adobe Fix Over 170 Security Flaws
13 Aug 2025
Contributed by Lukas
August 2025âs Patch Tuesday brought major security updates from two of the biggest names in technology â Microsoft and Adobe â addressing a comb...
RansomHub Hits Michiganâs Manpower â Data Breach Exposes 140,000 Individuals
13 Aug 2025
Contributed by Lukas
Manpower, a major staffing company based in Lansing, Michigan, has confirmed a ransomware attack that exposed the personal data of approximately 140,0...
Security Firms Warn GPT-5 Is Wide Open to Jailbreaks and Prompt Attacks
12 Aug 2025
Contributed by Lukas
Two independent security assessments have revealed serious vulnerabilities in GPT-5, the latest large language model release. NeuralTrustâs red team...
Germanyâs Top Court Limits Police Spyware to Serious Crimes Only
11 Aug 2025
Contributed by Lukas
Germanyâs Federal Constitutional Court has issued a landmark ruling sharply restricting the use of state spyware by law enforcement. The decision di...
BadCam: Lenovo Webcam Flaw Turns Everyday Cameras into Remote BadUSB Attack Tools
11 Aug 2025
Contributed by Lukas
A new hardware security warning has emerged with the discovery of BadCam, a set of vulnerabilities in certain Lenovo webcams that could allow attacker...
Free Wi-Fi Loophole Lets Hackers Breach Smart Bus Control Systems
11 Aug 2025
Contributed by Lukas
A new cybersecurity investigation has revealed that the same free passenger Wi-Fi offered on many smart buses is directly connected to critical onboar...
ReVault: Critical Dell Firmware Flaws Allow Windows Login Bypass and Persistent Implants
08 Aug 2025
Contributed by Lukas
In a powerful reminder that hardware security is just as critical as software defense, Cisco Talos researchers have uncovered âReVault,â a collect...
Air FranceâKLM Data Breach Exposes Customer Info via Compromised Third-Party Platform
07 Aug 2025
Contributed by Lukas
The aviation industry has suffered yet another major cybersecurity incident. Air France and KLM have confirmed a data breach impacting customer record...
Critical Flaws in CyberArk Conjur and HashiCorp Vault Put Enterprise Secrets at Risk
07 Aug 2025
Contributed by Lukas
Enterprise secrets managersâlong considered the most secure components in modern infrastructureâare now under fire. In a groundbreaking report, cy...
Prompt Injection Nightmare: Critical AI Vulnerabilities in ChatGPT, Copilot, Gemini & More
07 Aug 2025
Contributed by Lukas
Enterprise AI assistants are revolutionizing productivityâbut theyâre also opening new doors for cyberattacks. In this episode, we explore explosi...
From Google to LVMH: ShinyHuntersâ Salesforce Breaches Spark Global Ransom Crisis
07 Aug 2025
Contributed by Lukas
A new wave of cyber extortion is sweeping across global enterprises, and the battlefield is Salesforce CRM. The notorious **ShinyHunters groupâtrack...
Cisco Hit by Vishing Attack: CRM Breach Exposes Millions of User Profiles
06 Aug 2025
Contributed by Lukas
Cisco has confirmed a new data breach after a vishing (voice phishing) attack tricked a company representative into exposing access to a third-party C...
Ox Security Unveils Agent Ox: AI Tool That Writes Tailored Fixes for Software Vulnerabilities
06 Aug 2025
Contributed by Lukas
The world of application security is shifting dramatically as AI begins to move from simply flagging vulnerabilities to actively fixing them. Ox Secur...
Meta Deletes 6.8 Million Scam Accounts as AI-Powered Fraud Rings Exploit WhatsApp
06 Aug 2025
Contributed by Lukas
Meta has removed 6.8 million accounts tied to criminal scam centers in the first half of 2025, marking one of the most aggressive crackdowns on digita...
Meta Found Liable: Jury Rules Against Tech Giant in Flo Health Privacy Case
06 Aug 2025
Contributed by Lukas
In a landmark decision, a California jury has ruled Meta guilty of violating user privacy laws in a class-action lawsuit tied to the popular Flo Healt...
TSMC Insider Threat: Six Arrested in Taiwan Over 2nm Chip Trade Secrets
05 Aug 2025
Contributed by Lukas
In a stunning development, Taiwanese authorities have arrested six individuals suspected of stealing trade secrets from Taiwan Semiconductor Manufactu...
Approov Secures ÂŁ5M to Fortify Mobile App and API Security Against AI-Driven Threats
05 Aug 2025
Contributed by Lukas
In a major step for mobile and API cybersecurity, Approov, the Edinburgh-based security firm specializing in real-time mobile attestation and API prot...
Pwn2Own Ireland 2025: $1M WhatsApp Exploit Bounty Raises the Stakes
05 Aug 2025
Contributed by Lukas
This October, Pwn2Own Ireland 2025 will take over Cork with one of the most ambitious cybersecurity competitions yet. Co-sponsored by Meta and organiz...
Nvidia Triton Inference Server Vulnerabilities Expose AI Infrastructure to Attack
05 Aug 2025
Contributed by Lukas
A major warning has hit the AI community: Nvidiaâs Triton Inference Server â one of the most widely used open-source platforms for deploying and s...
CISA & FEMA Release $100M in Cybersecurity Grants to Strengthen State, Local, and Tribal Defenses
04 Aug 2025
Contributed by Lukas
The U.S. Department of Homeland Security, through CISA and FEMA, has announced over $100 million in new cybersecurity grant funding for Fiscal Year 20...
AI Jailbreaks on the Rise: How Hackers Are Extracting Training Data from LLMs
04 Aug 2025
Contributed by Lukas
In this episode, we examine the rapidly growing threat of AI jailbreaks â a cybersecurity challenge reshaping the landscape of large language models...
350,000 Patient Records Exposed: Inside the Northwest Radiologists Data Breach
04 Aug 2025
Contributed by Lukas
In this episode, we investigate the Northwest Radiologists data breach, a devastating cyberattack that compromised the personal and medical informatio...
Critical Honeywell Experion PKS Vulnerabilities Threaten Global Industrial Control Systems
31 Jul 2025
Contributed by Lukas
In this episode, we analyze the multiple vulnerabilities recently disclosed in Honeywellâs Experion Process Knowledge System (PKS), a widely deploye...
Auto-Color Linux Malware Exploits SAP Zero-Day CVE-2025-31324
31 Jul 2025
Contributed by Lukas
In this episode, we uncover the Auto-Color Linux malware, a stealthy and highly persistent Remote Access Trojan (RAT) that is rapidly emerging as one ...
Inside the July 2025 PyPI Phishing Scam: How Hackers Stole Developer Credentials
31 Jul 2025
Contributed by Lukas
In this episode, we investigate the growing cybersecurity storm targeting the Python Package Index (PyPI) â the backbone of Pythonâs software dist...
IoT Security Crisis: Dahua Smart Camera Vulnerabilities Expose Surveillance Systems
31 Jul 2025
Contributed by Lukas
In this episode, we examine the alarming discovery of critical security vulnerabilities in Dahua smart cameras, one of the worldâs most widely deplo...
Dropzone AI Secures $37M to Tackle Alert Fatigue with Autonomous SOC Analysts
30 Jul 2025
Contributed by Lukas
In this episode, we dive into Dropzone AIâs landmark $37 million Series B funding round, bringing the companyâs total raised to over $57 million. ...
Axonius Buys Cynerio for $100M+: Closing Healthcareâs Biggest Cybersecurity Blind Spot
30 Jul 2025
Contributed by Lukas
In this episode, we explore Axoniusâs landmark acquisition of Cynerio, a healthcare cybersecurity company specializing in protecting vulnerable medi...
Critical Lenovo Firmware Flaws Expose Millions to Persistent UEFI Attacks
30 Jul 2025
Contributed by Lukas
In this episode, we examine a critical firmware security crisis shaking Lenovo devices worldwide. Security researchers at Binarly have uncovered six s...
Promptfoo Secures $18.4M to Combat AI Security Threats in Generative AI
30 Jul 2025
Contributed by Lukas
In this episode, we dive into Promptfooâs groundbreaking $18.4 million Series A funding round, led by Insight Partners and supported by Andreessen H...
1.1 Million Private Messages Leaked: Inside the Tea App Privacy Disaster
29 Jul 2025
Contributed by Lukas
A platform designed to protect womenâs safety in dating has instead become a nightmare for its users. In this episode, we uncover the catastrophic T...
Job Scams, Corporate Espionage, and Digital Deception: Inside the Deepfake Crisis
29 Jul 2025
Contributed by Lukas
Deepfake technology has evolved from a fringe novelty into one of the most serious cybersecurity and national security threats of our time. In this ep...
Microsoft Exposes Major macOS Flaws in Transparency, Consent, and Control
29 Jul 2025
Contributed by Lukas
In this episode, we dive deep into Microsoft Threat Intelligenceâs latest findings on two critical macOS vulnerabilities that shook Appleâs privac...
Aeroflot in Chaos: How Hackers Crippled Russiaâs Flagship Airline
29 Jul 2025
Contributed by Lukas
On July 28, 2025, AeroflotâRussiaâs largest state-owned airlineâwas brought to its knees in one of the most severe cyberattacks since the countr...
Neferpitou Claims Cyberattack on French Naval Defense Giant
29 Jul 2025
Contributed by Lukas
French defense contractor Naval Group, a cornerstone of Europeâs naval defense industry, is facing a high-stakes cybersecurity crisis. A threat acto...
Root Evidence Launches With $12.5M to Redefine Vulnerability Management
28 Jul 2025
Contributed by Lukas
In July 2025, a team of seasoned cybersecurity leaders launched Root Evidence, a Boise-based startup with a mission to revolutionize how organizations...
NASCAR Hit by Medusa Ransomware: 1TB of Data Stolen in April 2025 Cyberattack
28 Jul 2025
Contributed by Lukas
In April 2025, NASCAR became the latest victim of a major cyberattack, with hackers infiltrating its network between March 31 and April 3. During the ...
Scattered Spider Strikes Again: Inside the VMware ESXi Ransomware Tactics
28 Jul 2025
Contributed by Lukas
In this episode, we examine the sophisticated operations of Scattered Spiderâalso known as Muddled Libra, UNC3944, and Octo Tempestâa financially ...
Koske Malware Hides in Panda Images, Weaponizes AI to Target Linux
25 Jul 2025
Contributed by Lukas
A new and highly sophisticated malware strain named Koske is redefining the threat landscape for Linux environments. Suspected to be partially develop...
Operation Checkmate: BlackSuit Ransomwareâs Dark Web Sites Seized
25 Jul 2025
Contributed by Lukas
BlackSuit, the ransomware strain known for crippling critical sectors and demanding multi-million dollar payouts, has just suffered a devastating blow...
Coyote Malware Exploits Microsoft UI Automation in First-Ever Wild Attack
25 Jul 2025
Contributed by Lukas
A new banking trojan called Coyote has emerged as a groundbreaking cyber threat, becoming the first known malware in the wild to exploit Microsoftâs...
No Fix Coming: Remote Code Execution Flaw in 1,300 LG Security Cameras
25 Jul 2025
Contributed by Lukas
A newly disclosed critical vulnerability, CVE-2025-7742, is putting hundreds of LG Innotek LNV5110R security cameras at risk around the worldâinclud...
ToolShell Exploited: China-Linked Hackers Breach NNSA and U.S. Government Networks
24 Jul 2025
Contributed by Lukas
In one of the most concerning state-sponsored cyber incidents of the year, Chinese hackers exploited zero-day vulnerabilities in Microsoft SharePoint ...
Massive NPM Breach: Malicious Packages Spread via Compromised Maintainer Accounts
24 Jul 2025
Contributed by Lukas
In this episode, we expose the alarming supply chain attack that compromised millions of JavaScript projects across the globe. This sophisticated brea...
Clorox Sues Cognizant Over $356M Cyberattack: Who's Really to Blame?
24 Jul 2025
Contributed by Lukas
In one of the most dramatic cybersecurity legal battles of the past year, Clorox has filed a lawsuit against IT services giant Cognizant, accusing the...
HeroDevs Secures $125M to Extend Life of Critical Open Source Software
24 Jul 2025
Contributed by Lukas
In this episode, we dive deep into HeroDevs' recent $125 million strategic growth investment, a move that signals a major expansion in the fight again...
UK Moves to Ban Ransomware Payments for Public Sector and Critical Infrastructure
23 Jul 2025
Contributed by Lukas
In a landmark move to disrupt the financial engine powering ransomware attacks, the United Kingdom is pushing forward with legislation that would ban ...
New SysAid Vulnerabilities Added to CISAâs KEV List: XXE Flaws Could Enable RCE
23 Jul 2025
Contributed by Lukas
Two newly added vulnerabilities in SysAidâs On-Prem IT support software â CVE-2025-2775 and CVE-2025-2776 â have officially joined the Cybersecu...
Lumma Stealer Returns: Malware-as-a-Service Resurges After Global Takedown
23 Jul 2025
Contributed by Lukas
In this episode, we unpack the rapid and concerning resurgence of Lumma Stealer, a sophisticated Malware-as-a-Service (MaaS) platform, just months aft...
Cisco ISE Critical Flaws Now Actively Exploited: No Workarounds, Just Root Access
23 Jul 2025
Contributed by Lukas
Hackers are actively exploiting a trio of critical zero-day vulnerabilities in Ciscoâs Identity Services Engine (ISE) and Passive Identity Connector...
ToolShell: SharePoint Zero-Day Chain Gives Hackers Full Remote Access
22 Jul 2025
Contributed by Lukas
A new wave of zero-day attacksâcollectively known as ToolShellâis actively targeting Microsoft SharePoint servers, with two vulnerabilities (CVE-2...
CVE-2025-54309: CrushFTP Zero-Day Exploited in Global Admin Access Attacks
22 Jul 2025
Contributed by Lukas
A critical zero-day vulnerability in CrushFTP (CVE-2025-54309) is being actively exploited, giving attackers administrative access to over a thousand ...
Dell Breach by World Leaks: Extortion Attempt Hits Demo Platform
22 Jul 2025
Contributed by Lukas
Dell Technologies is the latest target in a growing trend of data extortion attacks as threat actors pivot away from traditional ransomware. The cyber...
Critical VPN Vulnerability: ExpressVPN Exposed IPs via RDP Misrouting
22 Jul 2025
Contributed by Lukas
A critical vulnerability in ExpressVPNâs Windows client has put a spotlight on the often-overlooked dangers of debug code making its way into produc...
Dior Data Breach Exposes U.S. Customer Info in LVMH Vendor Attack
22 Jul 2025
Contributed by Lukas
In this episode, we unpack the January 2025 data breach at Dior, the iconic luxury fashion house, which exposed sensitive personal information of U.S....
StrongestLayer Raises $5.2M to Fight AI-Powered Phishing with TRACE
21 Jul 2025
Contributed by Lukas
In an era where generative AI is being used not just for productivity but for precision cybercrime, a San Francisco-based startup, StrongestLayer, is ...
750,000 Records Exposed: Inside the TADTS Data Breach by BianLian
21 Jul 2025
Contributed by Lukas
In July 2024, The Alcohol & Drug Testing Service (TADTS), a Texas-based company handling sensitive employment-related data, suffered a catastrophi...
SS7 Is Still Broken: How Surveillance Firms Are Bypassing Telco Defenses
21 Jul 2025
Contributed by Lukas
A new attack technique is exposing just how vulnerable global mobile networks remain in 2025. Cybersecurity firm Enea has discovered a surveillance op...
The UNFI Cyberattack: How Hackers Disrupted the U.S. Food Supply Chain
17 Jul 2025
Contributed by Lukas
In June 2025, United Natural Foods, Inc. (UNFI)âthe primary distributor for Whole Foods and tens of thousands of retailers across North Americaâsu...
Zuckerberg on Trial: The $8 Billion Data Privacy Reckoning
17 Jul 2025
Contributed by Lukas
More than five years after the Cambridge Analytica scandal, the legal and financial consequences are still playing outâthis time in Delawareâs Cha...
Operation Eastwood: Inside the Takedown of NoName057(16)
17 Jul 2025
Contributed by Lukas
A major Europol-led crackdownâOperation Eastwoodâhas disrupted one of the most active pro-Russian hacktivist collectives in Europe: NoName057(16)....
Phished and Exposed: What the Co-op Hack Reveals About Retail Cybersecurity
17 Jul 2025
Contributed by Lukas
In April 2025, The Co-opâone of the UKâs largest retailersâconfirmed a data breach that exposed the personal information of 6.5 million members....
FileFix Attacks Are Here: How Interlockâs Ransomware is Skipping Your Defenses
16 Jul 2025
Contributed by Lukas
In this episode, we break down how Interlock, a fast-moving ransomware group launched in late 2024, has evolved from using web injectors and clipboard...
Ontinue Uncovers SVG-Based Phishing: Why Your Browser Could Be the Weak Link
16 Jul 2025
Contributed by Lukas
Ontinue has uncovered a stealthy new phishing campaign thatâs flipping conventional defenses on their headâweaponizing SVG image files to silently...
Exein Raises âŹ70M: Defending the IoT-AI Frontier with Embedded Security
16 Jul 2025
Contributed by Lukas
Exein, the Italian cybersecurity company specializing in embedded IoT defense, has raised âŹ70 million in Series C funding, marking a significant mil...