- Home
- Cybercrime and Ransomware
- Emerging Tech
- Threat Intelligence
- Expert Insights
- Careers and Learning
- Compliance
Subscribe to Updates
Subscribe to our newsletter and never miss our latest news
Subscribe my Newsletter for New Posts & tips Let's stay updated!
Browsing: CISO Update
Essential Insights A North Korean state-sponsored group, HexagonalRodent, is running a campaign that manipulates software…
Essential Insights Emergence and Purpose: A sophisticated macOS malware called notnullOSX, surfaced in early 2026,…
Tropic Trooper Attack: Mastering Custom Beacon Listener & VS Code Tunnels for Remote Access
Fast Facts A cyberattack linked to the threat group Tropic Trooper exploits trojanized PDFs and…
Top Highlights A nation-state-linked hacking group, Harvester APT, has developed a Linux version of its…
Essential Insights Vercel experienced a security breach through an OAuth supply chain attack, stemming from…
Fast Facts ENISA’s NCAF 2.0 framework provides a structured, self-assessment tool for EU member states…
Fast Facts Serial-to-Ethernet adapters, critical in various industries, contain about 80 open-source components with nearly…
Summary Points Claude Mythos Preview discovered 271 vulnerabilities in Firefox 148—over ten times more than…
Summary Points Lotus Wiper is a targeted malware attack aimed at destroying data and systems…
Australia Tightens Cyber Reporting to Catch AI-Driven Critical Infrastructure Incidents
Summary Points Australia’s CISC mandates mandatory reporting of cyber incidents, including AI-related ones, to the…