Anonymously Accused Compliance Startup Delve of Misleading Customers An anonymous Substack post recently made allegations against compliance startup Delve, claiming that the company had misled “hundreds...
Russian Intelligence-Linked Threat Actors Targeting Encrypted Messaging Apps In a recent public service announcement, the FBI has cautioned users of encrypted messaging apps like Signal and...
Vendor Question How can we ensure that static credentials are not exploited for permanent access? Intent Validation Confirmation prompts, human-in-the-loop validation, and behavioral analysis Who Ships...
Discover the latest incidents in the Apple Crime Log, where we delve into crimes involving Apple products. In this edition, a thief makes off with $7,000...
The Rise of LeakNet Ransomware: ClickFix Technique and Deno Runtime In the realm of cyber threats, the LeakNet ransomware gang has adopted a stealthy approach using...
AI Tools in Modern Warfare: A Controversial Partnership The use of advanced AI tools like OpenAI’s ChatGPT and Anthropic’s Claude is not limited to consumer applications....
OpenAI recently introduced Codex Security on March 6, stepping into the realm of application security that had been disrupted by Anthropic’s Claude Code Security just two...
Cloud Attacks Exploit Vulnerabilities More Than Weak Credentials Recent reports from Google indicate a shift in cyber threats targeting cloud environments, with hackers increasingly exploiting newly...
In 2025, Google’s Threat Intelligence Group (GTIG) monitored and recorded 90 instances of zero-day vulnerabilities being actively exploited, with nearly half of them targeting enterprise software...
Cybersecurity Researchers Uncover ClickFix Campaign Delivering MIMICRAT Trojan Details have been revealed by cybersecurity researchers regarding a new ClickFix campaign that exploits compromised legitimate websites to...
Subscribe to our weekly newsletter below and never miss the latest News or an exclusive offer.