- Threat Actors Migrating to the Cloud
- Ransomware Evolved: Double Extortion
- E-Learning Platforms Getting Schooled – Multiple Vulnerabilities in WordPress’ Most Popular Learning Management System Plugins
- First seen in the wild – Malware uses Corporate MDM as attack vector
- SIGRed – Resolving Your Way into Domain Admin: Exploiting a 17 Year-old Bug in Windows DNS Servers
- Hacker, 22, seeks LTR with your data: vulnerabilities found on popular OkCupid dating app
- Don’t be silly – it’s only a lightbulb
- Keeping the gate locked on your IoT devices: Vulnerabilities found on Amazon’s Alexa
- Rampant Kitten – An Iranian Espionage Campaign
- Ransomware Alert: Pay2Key
- The Story of Jian – How APT31 Stole and Used an Unknown Equation Group 0-Day
- Pwn2Own Qualcomm DSP
- Indra — Hackers Behind Recent Attacks on Iran
- Looking for vulnerabilities in MediaTek audio DSP
- APT35 exploits Log4j vulnerability to distribute new modular PowerShell toolkit
- Leaks of Conti Ransomware Group Paint Picture of a Surprisingly Normal Tech Start-Up… Sort Of
- AirDrop process of ApeCoin cryptocurrency found vulnerable, led to theft of millions of dollars in NFTs
- Check Point Research detects vulnerability in the Everscale blockchain wallet, preventing cryptocurrency theft
- #ALHACK: One codec to hack the whole world
- State-sponsored Attack Groups Capitalise on Russia-Ukraine War for Cyber Espionage
- Twisted Panda: Chinese APT espionage operation against Russian’s state-owned defense institutes
- The New Era of Hacktivism – State-Mobilized Hacktivism Proliferates to the West and Beyond