Cyberattack

Cryptocurrency Vulnerability Exploited in $223 Million Cetus Protocol Hack

Cryptocurrency Vulnerability Exploited in $223 Million Cetus Protocol Hack

A critical vulnerability in the Cetus Protocol smart contract led to a $223 million cryptocurrency theft, highlighting major risks in DeFi platforms and blockchain security.

Foreign Hackers Charged in Botnet Scheme Targeting Global Routers

Foreign Hackers Charged in Botnet Scheme Targeting Global Routers

Four foreign nationals face charges for operating a botnet scheme that hijacked routers worldwide, earning over $46 million through the sale of illegal proxy services online.

184 Million Login Credentials From Microsoft, Instagram, Facebook Exposed

184 Million Login Credentials From Microsoft, Instagram, Facebook Exposed

Over 184 million login credentials, including Microsoft accounts, were exposed in an unsecured database linked to infostealer malware infections.

Ransomware Gangs Adopt Off-the-Shelf Malware for Post-Exploitation Activities

Ransomware Gangs Adopt Off-the-Shelf Malware for Post-Exploitation Activities

Read how ransomware gangs have turned to Skitnet malware for stealthy post-exploitation, enabling deep system control and persistence in targeted attacks.

Ransomware Infrastructure Dismantled in Global Operation

Ransomware Infrastructure Dismantled in Global Operation

A global crackdown dismantles ransomware infrastructure, seizes millions of dollars, and leads to arrests in sweeping international law enforcement operations.

DHS Cancels Multibillion-Dollar Cybersecurity Contract Following Legal Challenge

DHS Cancels Multibillion-Dollar Cybersecurity Contract Following Legal Challenge

Learn why DHS canceled a $2.4B cybersecurity contract after a protest by a rival bidder, raising questions about procurement fairness and compliance practices.

Dangerous Ransom Gang Scattered Spider Shifts Focus From UK to US Retail

Dangerous Ransom Gang Scattered Spider Shifts Focus From UK to US Retail

Read how the ransomware group Scattered Spider has been targeting US retail firms using advanced social engineering tactics, posing a significant risk to enterprises with large help desk operations.

The Rising Threat of AI Voice Hijacking in Cybersecurity

The Rising Threat of AI Voice Hijacking in Cybersecurity

Learn more about AI voice hijacking, the latest cyber threat. Just seconds of audio can fool employees, bypass voice security, and cost businesses millions.

Redefining IoT Cybersecurity for the Next Generation of Smart Devices and Robots

Redefining IoT Cybersecurity for the Next Generation of Smart Devices and Robots

From vacuums with arms to humanoid robots, the rise of smart devices demands a new era of IoT cybersecurity to safeguard both data and the physical world.

Internet Service Providers Battle Record-Breaking Surge in DDoS Attacks

Internet Service Providers Battle Record-Breaking Surge in DDoS Attacks

Read how DDoS attacks surged in 2025, with record-breaking volumes and new threats targeting networks and gaming servers.

Daily Updates

Sign up for our free daily newsletter for the latest news and business legal developments.

Scroll to Top