Guides, playbooks, and learning resources to level up your cybersecurity knowledge and keep your organization secure.
Google researchers have shown that breaking the encryption of Bitcoin and Ethereum requires 20x fewer qubits.
AtlasCross RAT spreads via 11 fake domains registered October 27, 2025, enabling encrypted C2 control and persistence.
The SQL injection vulnerability allows unauthenticated attackers to execute arbitrary code remotely, via crafted HTTP requests.
AI weaponizes the kill chain across hours or days, forcing continuous exposure and agentic defense to reduce exploitation risk.
Remotely exploitable, the integer underflow vulnerability impacts StrongSwan releases spanning 15 years.
A faulty software update led to the exposure of mobile banking users’ transactions to other users of the application.
U.S. prosecutors have charged a Maryland man with stealing more than $53 million after hacking the Uranium Finance crypto exchange twice and laundering the proceeds through a cryptocurrency mixer.
The Dutch Ministry of Finance took some of its systems offline, including the digital portal for treasury banking, while investigating a cyberattack detected two weeks ago.
It's not every day that you read that the head of America's top law enforcement agency has been hacked, but then - these aren't ordinary times.
In case of a cyber incident, most organizations fear more of data loss (via exfiltration) than regular data encryption because they have a good backup policy in place. If exfiltration happened, it means a total loss of control of the stolen data with all the consequences (PII, CC numbers, …).
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) ordered government agencies to patch their Citrix NetScaler appliances against an actively exploited vulnerability by Thursday.
Researchers found an OpenAI Codex vulnerability that could have been exploited to compromise GitHub tokens.