Guides, playbooks, and learning resources to level up your cybersecurity knowledge and keep your organization secure.
Legitimate-looking emails coming from Robinhood systems lured recipients to phishing websites.
VECT 2.0 destroys files over 131KB due to nonce flaw, launched December 2025, making ransom payments useless.
A member of Silk Typhoon, Xu Zewei is accused of launching cyberattacks against universities in the US.
This weekend, we saw a few requests to our honeypot that included an "X-Vercel-Set-Bypass-Cookie" header. A sample request:
Microsoft says it will start blocking legacy TLS connections for POP and IMAP email clients in Exchange Online starting in July 2026.
Threat actors are now publishing structured OPSEC playbooks to stay undetected. Flare reveals how these guides outline layered infrastructure, identity separation, and long-term evasion strategies.
Over 70 cloned Open VSX extensions are likely sleeper extensions designed to distribute malware.
View CSAF
Agentic AI can be expensive to use, causing further and unpredictable pressure on tight budgets.
CISA has added two new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.
84% of leaders say cross-network data sharing raises risk in 2026, as 53% rely on manual transfers, widening Zero Trust gaps.
Vulnerabilities in Zero Motorcycles electric motorcycles and Yadea electric scooters can pose physical security and safety risks.