Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Pricing
Podcast Image

Daily Security Review

Technology News

Episodes

Showing 101-200 of 410

AI-Powered Polymorphic Phishing: The New Era of Social Engineering

28 Aug 2025

Contributed by Lukas

Cybercrime is entering a new phase—one marked by AI-powered phishing attacks, the weaponization of legitimate remote access tools, and the rise of p...

Salesforce Breach: How OAuth Token Theft Exposed Hundreds of Organizations

28 Aug 2025

Contributed by Lukas

The recent Salesforce data breach underscores a growing reality in cybersecurity: even when core SaaS platforms are secure, their third-party integrat...

Silk Typhoon’s Fake Adobe Update: How China-Backed Hackers Target Diplomats

28 Aug 2025

Contributed by Lukas

A new and highly sophisticated cyber espionage campaign attributed to Silk Typhoon—also known as Mustang Panda, TEMP.Hex, or UNC6384—has been unco...

FTC Warns Tech Giants: Don’t Weaken Encryption for Foreign Governments

27 Aug 2025

Contributed by Lukas

The fight over encryption has entered a new phase. The Federal Trade Commission (FTC), led by Chairman Andrew Ferguson, has issued a strong warning to...

Invisible Prompts: How Image Scaling Attacks Break AI Security

27 Aug 2025

Contributed by Lukas

Researchers have uncovered a new form of indirect prompt injection that leverages a simple but powerful trick: image scaling. This novel attack involv...

Healthcare Services Group Breach Exposes 624,000 Individuals’ Sensitive Data

27 Aug 2025

Contributed by Lukas

The healthcare sector has been rocked yet again by a massive cybersecurity incident. Healthcare Services Group (HCSG), a provider of dining and laundr...

Auchan Data Breach: Hundreds of Thousands of Loyalty Accounts Compromised

27 Aug 2025

Contributed by Lukas

French retail giant Auchan has confirmed a massive data breach that compromised the personal details of hundreds of thousands of customers. The stolen...

Docker Desktop Vulnerability: Why Containers Aren’t as Safe as You Think

27 Aug 2025

Contributed by Lukas

A critical vulnerability in Docker Desktop, CVE-2025-9074, has shaken the container security world. Scoring 9.3 on the CVSS scale, this flaw exposed a...

Arch Linux Website, Forums, and AUR Targeted in Sustained Cyber Assault

26 Aug 2025

Contributed by Lukas

The Arch Linux community has just endured more than a week of turbulence as a massive distributed denial-of-service (DDoS) attack disrupted its most c...

Data I/O Ransomware Attack: Supply Chain Cybersecurity in Crisis

26 Aug 2025

Contributed by Lukas

Cyberattacks against supply chains are no longer isolated disruptions—they are systemic threats with the power to cascade across industries and nati...

BianLian Ransomware Strikes Aspire Rural Health: 138,000 Patients Exposed

26 Aug 2025

Contributed by Lukas

The U.S. healthcare sector continues to face relentless cyberattacks, and rural hospitals are increasingly at the center of this crisis. The recent As...

OneFlip: How a Single Bit-Flip Can Hack AI Models

26 Aug 2025

Contributed by Lukas

Artificial Intelligence (AI) models are shaping the future of industries from healthcare and finance to autonomous vehicles and national infrastructur...

PyPI Cracks Down on Domain Expiration Attacks to Protect Python Packages

21 Aug 2025

Contributed by Lukas

The Python Package Index (PyPI), the backbone of the global Python ecosystem, has rolled out new security safeguards aimed at stopping a dangerous for...

AI Joins the Fight Against Exploits: Google and Mozilla Patch Dangerous Vulnerabilities

20 Aug 2025

Contributed by Lukas

Both Google and Mozilla have rolled out urgent security updates to patch multiple high-severity vulnerabilities in their flagship browsers—Google Ch...

Britain Backs Down: UK Drops Encryption Backdoor Demand on Apple

20 Aug 2025

Contributed by Lukas

A major international clash over encryption has come to a dramatic resolution. Earlier this year, the U.K. government, acting under its controversial ...

PipeMagic Backdoor: How Ransomware Actors Exploited a Windows Zero-Day

20 Aug 2025

Contributed by Lukas

In early 2025, Microsoft and security researchers uncovered PipeMagic, a modular and memory-resident backdoor that has been quietly leveraged in ranso...

270,000 Intel Employee Records at Risk from Authentication Bypass and Hardcoded Credentials

20 Aug 2025

Contributed by Lukas

In late 2024, Intel faced a major cybersecurity wake-up call when security researcher Eaton Zveare uncovered a series of vulnerabilities inside the co...

How Social Engineering and Vendor Weaknesses Led to Allianz Life’s Massive Breach

20 Aug 2025

Contributed by Lukas

In July 2025, Allianz Life Insurance Company of North America confirmed a data breach impacting over 1.1 million customers, financial professionals, a...

Cloud Computing Heist: $3.5 Million Fraud Leads to Prison for Fake Crypto Influencer

19 Aug 2025

Contributed by Lukas

The U.S. Department of Justice has closed the chapter on one of the most audacious cloud fraud and cryptojacking schemes in recent years. Charles O. P...

Embassy Espionage: Kimsuky and Suspected Chinese Partners Deploy XenoRAT in Seoul

19 Aug 2025

Contributed by Lukas

A new wave of state-sponsored cyber espionage is sweeping across South Korea, targeting foreign embassies through highly tailored, multi-stage spearph...

GSMA Confirms Flaws: Researchers Unveil Dangerous 5G Sniffing and Injection Attack

19 Aug 2025

Contributed by Lukas

A groundbreaking security study from the Singapore University of Technology and Design has revealed a major vulnerability in 5G networks that allows a...

SAP NetWeaver Under Siege: New Exploit Chains Threaten Global Enterprises

19 Aug 2025

Contributed by Lukas

SAP NetWeaver, one of the world’s most critical enterprise platforms, is under active attack from both ransomware groups and state-backed hackers. A...

Ransomware Gangs Deploy Kernel-Level EDR Killers to Evade Detection

19 Aug 2025

Contributed by Lukas

Ransomware gangs are no longer just encrypting files and demanding payment—they are actively targeting the very defenses meant to stop them. Recent ...

Chinese APTs Target Taiwan: UAT-7237’s SoundBill Loader and Gelsemium’s FireWood Backdoor

18 Aug 2025

Contributed by Lukas

Taiwan continues to face an unprecedented wave of cyberattacks, with new intelligence exposing two distinct but sophisticated campaigns linked to Chin...

Colt Cyberattack: Multi-Day Outages After WarLock Ransomware Exploited SharePoint Zero-Day

18 Aug 2025

Contributed by Lukas

Colt Technology Services, a major UK-based telecommunications provider with operations in over 40 countries, has confirmed that the WarLock ransomware...

Workday Breach Tied to Third-Party CRM Hack in ShinyHunters Campaign

18 Aug 2025

Contributed by Lukas

Workday, one of the world’s leading providers of human resources and financial management software, has confirmed a data breach that exposed busines...

DOJ Brings Down Zeppelin Ransomware Operator, Seizes Millions in Crypto

18 Aug 2025

Contributed by Lukas

The U.S. Department of Justice has successfully dismantled a major operator behind the notorious Zeppelin ransomware, charging Russian national Ianis ...

U.S. Sanctions Grinex, the Russian Crypto Exchange Born from Garantex’s Ashes

16 Aug 2025

Contributed by Lukas

The U.S. Department of the Treasury has announced sweeping sanctions against Grinex, a Russian-linked cryptocurrency exchange identified as the direct...

Canadian House of Commons Breach Tied to Microsoft SharePoint Zero-Day

15 Aug 2025

Contributed by Lukas

On August 8th, 2025, hackers breached the Canadian House of Commons by exploiting a critical Microsoft SharePoint zero-day vulnerability—CVE-2025-53...

Norwegian Authorities Blame Pro-Russian Hackers for Critical Infrastructure Breach

15 Aug 2025

Contributed by Lukas

In April 2025, Norway experienced a chilling reminder of the risks facing its critical infrastructure when pro-Russian hackers took control of the Lak...

MadeYouReset: New HTTP/2 Flaw Could Unleash Massive DDoS Storms

15 Aug 2025

Contributed by Lukas

A newly disclosed HTTP/2 vulnerability—dubbed MadeYouReset (CVE-2025-8671)—is making waves across the cybersecurity community for its potential to...

Cybersecurity Budgets Hit Historic Slowdown as Global Tensions Mount

15 Aug 2025

Contributed by Lukas

Global cybersecurity strategies are being tested like never before as organizations face the dual pressure of escalating cyber threats and shrinking b...

CVE-2025-53786: The Microsoft Exchange Hybrid Flaw That Could Take Down Your Domain

14 Aug 2025

Contributed by Lukas

A critical security flaw, tracked as CVE-2025-53786, is putting tens of thousands of organizations at risk — and U.S. federal agencies are under ord...

Allianz Life Breach: 2.8 Million Records Leaked in Salesforce Hack

14 Aug 2025

Contributed by Lukas

On July 16, 2025, Allianz Life Insurance Company of North America confirmed a major data breach that exposed up to 2.8 million sensitive records belon...

Charon Ransomware Targets Middle East Government and Aviation Sectors

13 Aug 2025

Contributed by Lukas

A newly discovered ransomware family named Charon is making waves in the cybersecurity world — and not for good reasons. Targeting government agenci...

August 2025 Patch Tuesday: Microsoft and Adobe Fix Over 170 Security Flaws

13 Aug 2025

Contributed by Lukas

August 2025’s Patch Tuesday brought major security updates from two of the biggest names in technology — Microsoft and Adobe — addressing a comb...

RansomHub Hits Michigan’s Manpower — Data Breach Exposes 140,000 Individuals

13 Aug 2025

Contributed by Lukas

Manpower, a major staffing company based in Lansing, Michigan, has confirmed a ransomware attack that exposed the personal data of approximately 140,0...

Security Firms Warn GPT-5 Is Wide Open to Jailbreaks and Prompt Attacks

12 Aug 2025

Contributed by Lukas

Two independent security assessments have revealed serious vulnerabilities in GPT-5, the latest large language model release. NeuralTrust’s red team...

Germany’s Top Court Limits Police Spyware to Serious Crimes Only

11 Aug 2025

Contributed by Lukas

Germany’s Federal Constitutional Court has issued a landmark ruling sharply restricting the use of state spyware by law enforcement. The decision di...

BadCam: Lenovo Webcam Flaw Turns Everyday Cameras into Remote BadUSB Attack Tools

11 Aug 2025

Contributed by Lukas

A new hardware security warning has emerged with the discovery of BadCam, a set of vulnerabilities in certain Lenovo webcams that could allow attacker...

Free Wi-Fi Loophole Lets Hackers Breach Smart Bus Control Systems

11 Aug 2025

Contributed by Lukas

A new cybersecurity investigation has revealed that the same free passenger Wi-Fi offered on many smart buses is directly connected to critical onboar...

ReVault: Critical Dell Firmware Flaws Allow Windows Login Bypass and Persistent Implants

08 Aug 2025

Contributed by Lukas

In a powerful reminder that hardware security is just as critical as software defense, Cisco Talos researchers have uncovered “ReVault,” a collect...

Air France–KLM Data Breach Exposes Customer Info via Compromised Third-Party Platform

07 Aug 2025

Contributed by Lukas

The aviation industry has suffered yet another major cybersecurity incident. Air France and KLM have confirmed a data breach impacting customer record...

Critical Flaws in CyberArk Conjur and HashiCorp Vault Put Enterprise Secrets at Risk

07 Aug 2025

Contributed by Lukas

Enterprise secrets managers—long considered the most secure components in modern infrastructure—are now under fire. In a groundbreaking report, cy...

Prompt Injection Nightmare: Critical AI Vulnerabilities in ChatGPT, Copilot, Gemini & More

07 Aug 2025

Contributed by Lukas

Enterprise AI assistants are revolutionizing productivity—but they’re also opening new doors for cyberattacks. In this episode, we explore explosi...

From Google to LVMH: ShinyHunters’ Salesforce Breaches Spark Global Ransom Crisis

07 Aug 2025

Contributed by Lukas

A new wave of cyber extortion is sweeping across global enterprises, and the battlefield is Salesforce CRM. The notorious **ShinyHunters group—track...

Cisco Hit by Vishing Attack: CRM Breach Exposes Millions of User Profiles

06 Aug 2025

Contributed by Lukas

Cisco has confirmed a new data breach after a vishing (voice phishing) attack tricked a company representative into exposing access to a third-party C...

Ox Security Unveils Agent Ox: AI Tool That Writes Tailored Fixes for Software Vulnerabilities

06 Aug 2025

Contributed by Lukas

The world of application security is shifting dramatically as AI begins to move from simply flagging vulnerabilities to actively fixing them. Ox Secur...

Meta Deletes 6.8 Million Scam Accounts as AI-Powered Fraud Rings Exploit WhatsApp

06 Aug 2025

Contributed by Lukas

Meta has removed 6.8 million accounts tied to criminal scam centers in the first half of 2025, marking one of the most aggressive crackdowns on digita...

Meta Found Liable: Jury Rules Against Tech Giant in Flo Health Privacy Case

06 Aug 2025

Contributed by Lukas

In a landmark decision, a California jury has ruled Meta guilty of violating user privacy laws in a class-action lawsuit tied to the popular Flo Healt...

TSMC Insider Threat: Six Arrested in Taiwan Over 2nm Chip Trade Secrets

05 Aug 2025

Contributed by Lukas

In a stunning development, Taiwanese authorities have arrested six individuals suspected of stealing trade secrets from Taiwan Semiconductor Manufactu...

Approov Secures ÂŁ5M to Fortify Mobile App and API Security Against AI-Driven Threats

05 Aug 2025

Contributed by Lukas

In a major step for mobile and API cybersecurity, Approov, the Edinburgh-based security firm specializing in real-time mobile attestation and API prot...

Pwn2Own Ireland 2025: $1M WhatsApp Exploit Bounty Raises the Stakes

05 Aug 2025

Contributed by Lukas

This October, Pwn2Own Ireland 2025 will take over Cork with one of the most ambitious cybersecurity competitions yet. Co-sponsored by Meta and organiz...

Nvidia Triton Inference Server Vulnerabilities Expose AI Infrastructure to Attack

05 Aug 2025

Contributed by Lukas

A major warning has hit the AI community: Nvidia’s Triton Inference Server — one of the most widely used open-source platforms for deploying and s...

CISA & FEMA Release $100M in Cybersecurity Grants to Strengthen State, Local, and Tribal Defenses

04 Aug 2025

Contributed by Lukas

The U.S. Department of Homeland Security, through CISA and FEMA, has announced over $100 million in new cybersecurity grant funding for Fiscal Year 20...

AI Jailbreaks on the Rise: How Hackers Are Extracting Training Data from LLMs

04 Aug 2025

Contributed by Lukas

In this episode, we examine the rapidly growing threat of AI jailbreaks — a cybersecurity challenge reshaping the landscape of large language models...

350,000 Patient Records Exposed: Inside the Northwest Radiologists Data Breach

04 Aug 2025

Contributed by Lukas

In this episode, we investigate the Northwest Radiologists data breach, a devastating cyberattack that compromised the personal and medical informatio...

Critical Honeywell Experion PKS Vulnerabilities Threaten Global Industrial Control Systems

31 Jul 2025

Contributed by Lukas

In this episode, we analyze the multiple vulnerabilities recently disclosed in Honeywell’s Experion Process Knowledge System (PKS), a widely deploye...

Auto-Color Linux Malware Exploits SAP Zero-Day CVE-2025-31324

31 Jul 2025

Contributed by Lukas

In this episode, we uncover the Auto-Color Linux malware, a stealthy and highly persistent Remote Access Trojan (RAT) that is rapidly emerging as one ...

Inside the July 2025 PyPI Phishing Scam: How Hackers Stole Developer Credentials

31 Jul 2025

Contributed by Lukas

In this episode, we investigate the growing cybersecurity storm targeting the Python Package Index (PyPI) — the backbone of Python’s software dist...

IoT Security Crisis: Dahua Smart Camera Vulnerabilities Expose Surveillance Systems

31 Jul 2025

Contributed by Lukas

In this episode, we examine the alarming discovery of critical security vulnerabilities in Dahua smart cameras, one of the world’s most widely deplo...

Dropzone AI Secures $37M to Tackle Alert Fatigue with Autonomous SOC Analysts

30 Jul 2025

Contributed by Lukas

In this episode, we dive into Dropzone AI’s landmark $37 million Series B funding round, bringing the company’s total raised to over $57 million. ...

Axonius Buys Cynerio for $100M+: Closing Healthcare’s Biggest Cybersecurity Blind Spot

30 Jul 2025

Contributed by Lukas

In this episode, we explore Axonius’s landmark acquisition of Cynerio, a healthcare cybersecurity company specializing in protecting vulnerable medi...

Critical Lenovo Firmware Flaws Expose Millions to Persistent UEFI Attacks

30 Jul 2025

Contributed by Lukas

In this episode, we examine a critical firmware security crisis shaking Lenovo devices worldwide. Security researchers at Binarly have uncovered six s...

Promptfoo Secures $18.4M to Combat AI Security Threats in Generative AI

30 Jul 2025

Contributed by Lukas

In this episode, we dive into Promptfoo’s groundbreaking $18.4 million Series A funding round, led by Insight Partners and supported by Andreessen H...

1.1 Million Private Messages Leaked: Inside the Tea App Privacy Disaster

29 Jul 2025

Contributed by Lukas

A platform designed to protect women’s safety in dating has instead become a nightmare for its users. In this episode, we uncover the catastrophic T...

Job Scams, Corporate Espionage, and Digital Deception: Inside the Deepfake Crisis

29 Jul 2025

Contributed by Lukas

Deepfake technology has evolved from a fringe novelty into one of the most serious cybersecurity and national security threats of our time. In this ep...

Microsoft Exposes Major macOS Flaws in Transparency, Consent, and Control

29 Jul 2025

Contributed by Lukas

In this episode, we dive deep into Microsoft Threat Intelligence’s latest findings on two critical macOS vulnerabilities that shook Apple’s privac...

Aeroflot in Chaos: How Hackers Crippled Russia’s Flagship Airline

29 Jul 2025

Contributed by Lukas

On July 28, 2025, Aeroflot—Russia’s largest state-owned airline—was brought to its knees in one of the most severe cyberattacks since the countr...

Neferpitou Claims Cyberattack on French Naval Defense Giant

29 Jul 2025

Contributed by Lukas

French defense contractor Naval Group, a cornerstone of Europe’s naval defense industry, is facing a high-stakes cybersecurity crisis. A threat acto...

Root Evidence Launches With $12.5M to Redefine Vulnerability Management

28 Jul 2025

Contributed by Lukas

In July 2025, a team of seasoned cybersecurity leaders launched Root Evidence, a Boise-based startup with a mission to revolutionize how organizations...

NASCAR Hit by Medusa Ransomware: 1TB of Data Stolen in April 2025 Cyberattack

28 Jul 2025

Contributed by Lukas

In April 2025, NASCAR became the latest victim of a major cyberattack, with hackers infiltrating its network between March 31 and April 3. During the ...

Scattered Spider Strikes Again: Inside the VMware ESXi Ransomware Tactics

28 Jul 2025

Contributed by Lukas

In this episode, we examine the sophisticated operations of Scattered Spider—also known as Muddled Libra, UNC3944, and Octo Tempest—a financially ...

Koske Malware Hides in Panda Images, Weaponizes AI to Target Linux

25 Jul 2025

Contributed by Lukas

A new and highly sophisticated malware strain named Koske is redefining the threat landscape for Linux environments. Suspected to be partially develop...

Operation Checkmate: BlackSuit Ransomware’s Dark Web Sites Seized

25 Jul 2025

Contributed by Lukas

BlackSuit, the ransomware strain known for crippling critical sectors and demanding multi-million dollar payouts, has just suffered a devastating blow...

Coyote Malware Exploits Microsoft UI Automation in First-Ever Wild Attack

25 Jul 2025

Contributed by Lukas

A new banking trojan called Coyote has emerged as a groundbreaking cyber threat, becoming the first known malware in the wild to exploit Microsoft’s...

No Fix Coming: Remote Code Execution Flaw in 1,300 LG Security Cameras

25 Jul 2025

Contributed by Lukas

A newly disclosed critical vulnerability, CVE-2025-7742, is putting hundreds of LG Innotek LNV5110R security cameras at risk around the world—includ...

ToolShell Exploited: China-Linked Hackers Breach NNSA and U.S. Government Networks

24 Jul 2025

Contributed by Lukas

In one of the most concerning state-sponsored cyber incidents of the year, Chinese hackers exploited zero-day vulnerabilities in Microsoft SharePoint ...

Massive NPM Breach: Malicious Packages Spread via Compromised Maintainer Accounts

24 Jul 2025

Contributed by Lukas

In this episode, we expose the alarming supply chain attack that compromised millions of JavaScript projects across the globe. This sophisticated brea...

Clorox Sues Cognizant Over $356M Cyberattack: Who's Really to Blame?

24 Jul 2025

Contributed by Lukas

In one of the most dramatic cybersecurity legal battles of the past year, Clorox has filed a lawsuit against IT services giant Cognizant, accusing the...

HeroDevs Secures $125M to Extend Life of Critical Open Source Software

24 Jul 2025

Contributed by Lukas

In this episode, we dive deep into HeroDevs' recent $125 million strategic growth investment, a move that signals a major expansion in the fight again...

UK Moves to Ban Ransomware Payments for Public Sector and Critical Infrastructure

23 Jul 2025

Contributed by Lukas

In a landmark move to disrupt the financial engine powering ransomware attacks, the United Kingdom is pushing forward with legislation that would ban ...

New SysAid Vulnerabilities Added to CISA’s KEV List: XXE Flaws Could Enable RCE

23 Jul 2025

Contributed by Lukas

Two newly added vulnerabilities in SysAid’s On-Prem IT support software — CVE-2025-2775 and CVE-2025-2776 — have officially joined the Cybersecu...

Lumma Stealer Returns: Malware-as-a-Service Resurges After Global Takedown

23 Jul 2025

Contributed by Lukas

In this episode, we unpack the rapid and concerning resurgence of Lumma Stealer, a sophisticated Malware-as-a-Service (MaaS) platform, just months aft...

Cisco ISE Critical Flaws Now Actively Exploited: No Workarounds, Just Root Access

23 Jul 2025

Contributed by Lukas

Hackers are actively exploiting a trio of critical zero-day vulnerabilities in Cisco’s Identity Services Engine (ISE) and Passive Identity Connector...

ToolShell: SharePoint Zero-Day Chain Gives Hackers Full Remote Access

22 Jul 2025

Contributed by Lukas

A new wave of zero-day attacks—collectively known as ToolShell—is actively targeting Microsoft SharePoint servers, with two vulnerabilities (CVE-2...

CVE-2025-54309: CrushFTP Zero-Day Exploited in Global Admin Access Attacks

22 Jul 2025

Contributed by Lukas

A critical zero-day vulnerability in CrushFTP (CVE-2025-54309) is being actively exploited, giving attackers administrative access to over a thousand ...

Dell Breach by World Leaks: Extortion Attempt Hits Demo Platform

22 Jul 2025

Contributed by Lukas

Dell Technologies is the latest target in a growing trend of data extortion attacks as threat actors pivot away from traditional ransomware. The cyber...

Critical VPN Vulnerability: ExpressVPN Exposed IPs via RDP Misrouting

22 Jul 2025

Contributed by Lukas

A critical vulnerability in ExpressVPN’s Windows client has put a spotlight on the often-overlooked dangers of debug code making its way into produc...

Dior Data Breach Exposes U.S. Customer Info in LVMH Vendor Attack

22 Jul 2025

Contributed by Lukas

In this episode, we unpack the January 2025 data breach at Dior, the iconic luxury fashion house, which exposed sensitive personal information of U.S....

StrongestLayer Raises $5.2M to Fight AI-Powered Phishing with TRACE

21 Jul 2025

Contributed by Lukas

In an era where generative AI is being used not just for productivity but for precision cybercrime, a San Francisco-based startup, StrongestLayer, is ...

750,000 Records Exposed: Inside the TADTS Data Breach by BianLian

21 Jul 2025

Contributed by Lukas

In July 2024, The Alcohol & Drug Testing Service (TADTS), a Texas-based company handling sensitive employment-related data, suffered a catastrophi...

SS7 Is Still Broken: How Surveillance Firms Are Bypassing Telco Defenses

21 Jul 2025

Contributed by Lukas

A new attack technique is exposing just how vulnerable global mobile networks remain in 2025. Cybersecurity firm Enea has discovered a surveillance op...

The UNFI Cyberattack: How Hackers Disrupted the U.S. Food Supply Chain

17 Jul 2025

Contributed by Lukas

In June 2025, United Natural Foods, Inc. (UNFI)—the primary distributor for Whole Foods and tens of thousands of retailers across North America—su...

Zuckerberg on Trial: The $8 Billion Data Privacy Reckoning

17 Jul 2025

Contributed by Lukas

More than five years after the Cambridge Analytica scandal, the legal and financial consequences are still playing out—this time in Delaware’s Cha...

Operation Eastwood: Inside the Takedown of NoName057(16)

17 Jul 2025

Contributed by Lukas

A major Europol-led crackdown—Operation Eastwood—has disrupted one of the most active pro-Russian hacktivist collectives in Europe: NoName057(16)....

Phished and Exposed: What the Co-op Hack Reveals About Retail Cybersecurity

17 Jul 2025

Contributed by Lukas

In April 2025, The Co-op—one of the UK’s largest retailers—confirmed a data breach that exposed the personal information of 6.5 million members....

FileFix Attacks Are Here: How Interlock’s Ransomware is Skipping Your Defenses

16 Jul 2025

Contributed by Lukas

In this episode, we break down how Interlock, a fast-moving ransomware group launched in late 2024, has evolved from using web injectors and clipboard...

Ontinue Uncovers SVG-Based Phishing: Why Your Browser Could Be the Weak Link

16 Jul 2025

Contributed by Lukas

Ontinue has uncovered a stealthy new phishing campaign that’s flipping conventional defenses on their head—weaponizing SVG image files to silently...

Exein Raises €70M: Defending the IoT-AI Frontier with Embedded Security

16 Jul 2025

Contributed by Lukas

Exein, the Italian cybersecurity company specializing in embedded IoT defense, has raised €70 million in Series C funding, marking a significant mil...