- Home
- Cybercrime and Ransomware
- Emerging Tech
- Threat Intelligence
- Expert Insights
- Careers and Learning
- Compliance
Subscribe to Updates
Subscribe to our newsletter and never miss our latest news
Subscribe my Newsletter for New Posts & tips Let's stay updated!
Month: April 2026
Summary Points Lotus Wiper is a targeted malware attack aimed at destroying data and systems…
Summary Points Cybercriminals are exploiting npm and PyPI packages using compromised developer tokens and malicious…
Australia Tightens Cyber Reporting to Catch AI-Driven Critical Infrastructure Incidents
Summary Points Australia’s CISC mandates mandatory reporting of cyber incidents, including AI-related ones, to the…
Quick Takeaways The ransomware and digital extortion threat landscape remains stable with over 2,059 incidents…
Seattle: Revolutionizing Agentic R&D at Scale [The event, titled “Microsoft Discovery: Advancing agentic R&D at…
Essential Insights North Korean threat actors are increasingly using compromised developer repositories in the software…
Quick Takeaways Moltbook exposed sensitive data, including email addresses and API tokens, highlighting risks from…
Top Highlights DinDoor employs the legitimate Deno JavaScript runtime and MSI installer files, leveraging trusted…
Top Highlights Hostile nations like Russia, Iran, and China are now conducting the most serious…
Fast Facts An expansive mobile proxy ecosystem powered by ProxySmart operates across 17 countries, utilizing…