- Home
- Cybercrime and Ransomware
- Emerging Tech
- Threat Intelligence
- Expert Insights
- Careers and Learning
- Compliance
Subscribe to Updates
Subscribe to our newsletter and never miss our latest news
Subscribe my Newsletter for New Posts & tips Let's stay updated!
Month: April 2026
Summary Points Enforce multi-factor authentication (MFA) universally, especially for high-privilege and external-facing accounts, to prevent…
Summary Points Supply chain attacks bypass traditional defenses via trusted vendors, making security a core…
Essential Insights Storm-1175 is executing rapid, high-velocity ransomware campaigns, often within 24 hours of vulnerability…
Fast Facts Effective attack surface management (ASM) requires continuous visibility across all digital, physical, human,…
Hackers Exploit Next.js React2Shell Flaw to Steal Credentials from 766 Hosts in 24 Hours
Fast Facts A fast-spreading cyberattack exploits the critical React2Shell flaw (CVE-2025-55182) in Next.js, breaching 766…
Essential Insights A China-based threat actor, Storm-1175, actively exploits zero-day and known vulnerabilities to quickly…
Summary Points Malaysia’s rapidly expanding digital infrastructure and strategic geopolitical position are increasing its vulnerability…
Essential Insights Cybercrime losses surged by 26% to nearly $20.9 billion in 2025, representing a…
Storm-1175 Targets Healthcare Systems to Launch Ransomware Attacks Across US, UK, and Australia
Summary Points New findings reveal that Storm-1175, deploying Medusa ransomware, is rapidly exploiting recently disclosed…
Top Highlights Credential incidents, such as lockouts and breaches, cause ongoing operational costs, helpdesk overloads,…