U.S. Extradites Ukrainian for Alleged Ransomware Attacks
U.S. extradites Ukrainian citizen for ransomware attacks using Nefilim. The charges relate to attacks on high-revenue companies across various sectors.…
Authorities Dismantle Global Child Sextortion Network through Key Arrests
Key arrests disrupt a global child sextortion group's operations. 764 targeted minors through manipulation and coercion strategies. Authorities emphasize international…
North Korean IT Workers Infiltrate Global Corporations
North Korean IT workers infiltrate Fortune 500 companies. Global companies face increased risk of data breaches. Enhanced cybersecurity measures are…
Noem Refocuses CISA to Tackle Cyber Threats from China
Noem seeks CISA's shift to focus on cybersecurity over misinformation. Technology procurement will prioritize secure design from the start. CISA…
Cybersecurity Giants Work Together to Combat Evolving Threats
Tech companies and authorities increase collaboration against cybercrime. Data exchange expedites the arrest and prosecution processes. Permanent solutions require understanding…
Cybersecurity Experts Condemn Retaliation Against Chris Krebs
Experts denounce actions against Chris Krebs and SentinelOne. Executive order revoked security clearances and initiated investigations. Calls for reinstatement and…
Experts Discuss Evolving Chinese Cyber Threats at NYSE Event
Experts addressed the shift in Chinese cyber strategies. Discussions highlighted the need for stronger US cyber defenses. Strategies include technology…
Hackers Actively Exploiting SAP NetWeaver Zero-Day Vulnerability
Widespread exploitation of SAP NetWeaver vulnerability CVE-2025-31324 observed. An emergency patch is available to SAP customers to address the flaw.…
North Korean Hackers Steal $1.5 Billion From Global Exchange
North Korea executed a major $1.5 billion cryptocurrency theft. The Lazarus Group utilized sophisticated cyberattack techniques. Enhanced global cybersecurity measures…
Attackers Exploit One-Third of New Vulnerabilities Within a Day
Attackers exploit 33% of new vulnerabilities within a day. Content management and network devices are top targets. Timely patching and…