Guides, playbooks, and learning resources to level up your cybersecurity knowledge and keep your organization secure.
Threat actors are reusing Tycoon 2FA tools across other phishing kits following the platform’s disruption.
$13.74M stolen from Grinex on April 15, 2026 after sanctions, disrupting Russia-linked evasion networks.
CVE-2024-3721 and CVE-2023-33538 exploited in TBK DVRs and EoL TP-Link routers, enabling Mirai variants and DDoS risk.
Industry and ad hoc coalitions appear poised to help fill the gap created by NIST's decision to cut back on CVE data enrichment.
The Payouts King ransomware is using the QEMU emulator as a reverse SSH backdoor to run hidden virtual machines on compromised systems and bypass endpoint security.
In embracing device code phishing, attackers trick victims into handing over account access by using a service's legitimate new-device login flow.
A White House official said the administration is engaging with advanced AI labs about their models and the security of software.
Kyrgyzstan-based cryptocurrency exchange Grinex has suspended its operations after suffering a $13.7 million hack attributed to Western intelligence agencies.
CoChat is fundamentally an AI collaboration platform designed for teamwork and to bring visibility and governance into enterprise AI shadows.
AI's danger isn't that it's creating new bugs, it's that it's amplifying old ones.
In cybercrime markets, trust isn't assumed, it's verified. Flare reveals how underground guides teach actors to evaluate carding shops based on data quality, reputation, and survivability.
Three Defender zero-days exploited since April 10, 2026, enabling privilege escalation and DoS, forcing isolation of affected systems.