{"id":"bc8c9cbb-a11a-4131-ad6b-e9670c646a9f","timestamp":1775141500321,"matcher":{"static":{},"wildcard":{},"dynamic":{}},"prerendered":["/terms-of-service","/about-us","/editorial-policy","/contact-us","/rss","/privacy-policy","/disclaimer","/articles/2025-cybersecurity-ma-review-mega-deals-reshape-industry","/articles/akira-ransomware-exploits-sonicwall-ssl-vpn-devices","/articles/akira-ransomware-claims-attack-on-apache-openoffice-threatens-data-leak","/articles/academic-urology-urogynecology-of-arizona-notifies-patients-of-data-breach","/articles/advanced-threat-actor-exploits-cisco-ise-and-citrix-netscaler-zero-days","/publications","/articles/2025-data-breaches-driven-by-misconfigurations-and-supply-chain-attacks","/articles/ai-powered-phishing-emails-prove-4-5-times-more-effective-microsoft-report-finds","/articles/ai-in-the-middle-attack-abuses-ai-assistants-for-c2","/articles/ai-rejects-future-dated-cyber-threat-request-upholding-data-integrity","/articles/airsnitch-wifi-attack-bypasses-wpa3-encryption","/articles/ai-risk-disclosures-surge-among-sp-500-companies-report","/articles/adversarial-poetry-universal-llm-jailbreak-technique","/articles/2025-the-year-ai-redefines-cyberattacks-and-defense","/articles/advantest-corporation-investigates-ransomware-attack-on-internal-network","/articles/airstalk-malware-used-in-suspected-nation-state-supply-chain-attack","/articles/adidas-investigates-third-party-data-breach-claimed-by-lapsus-group","/articles/acronis-launches-s3-compatible-archival-storage-for-msps","/articles/access-broker-storm-0249-shifts-to-advanced-ransomware-delivery","/articles/175-malicious-npm-packages-used-in-phishing-campaign","/articles/active-exploitation-of-zero-day-flaw-in-end-of-life-d-link-routers","/articles/ai-emerges-as-top-cybersecurity-risk-for-retail-and-hospitality","/articles/agenda-qilin-ransomware-abuses-legit-tools-targets-critical-infrastructure","/articles/actively-exploited-android-zero-days-added-to-cisa-kev-catalog","/articles/adobe-october-2025-patch-tuesday-fixes-critical-connect-flaw","/articles/ai-driven-social-engineering-top-cyber-threat-for-2026","/articles/ai-in-malware-evolves-from-assistant-to-embedded-component","/articles/ai-threat-hunting-uncovers-ghostpenguin-linux-backdoor","/articles/aisuru-botnet-launches-record-breaking-29-7-tbps-ddos-attack","/articles/ai-powered-ransomware-outpacing-defenses-crowdstrike-warns","/articles/airlines-data-breach-hits-millions-vietnam-airlines-qantas-customers","/articles/10000-fortinet-firewalls-exposed-to-critical-2fa-bypass-flaw","/articles/2025-threat-report-highlights-ai-social-engineering-and-identity-attacks","/articles/active-directory-at-risk-from-over-privileged-domain-join-accounts","/articles/2025-year-end-analysis-industrialized-ransomware-and-edge-device-crisis","/articles/active-exploitation-of-critical-7-zip-rce-vulnerability-confirmed","/articles/76-percent-of-orgs-cant-match-speed-of-ai-powered-attacks","/articles/akira-ransomware-hits-lg-energy-solution-claims-1-7tb-data-theft","/articles/akira-ransomware-exploits-unpatched-sonicwall-devices-during-ma","/articles/akira-ransomware-group-claims-attack-on-manufacturer-koch-and-co","/articles/akzonobel-confirms-ransomware-attack-by-anubis-group","/articles/allervie-health-notifies-patients-of-anubis-ransomware-attack","/articles/amazon-uncovers-apt-exploiting-cisco-and-citrix-zero-day-flaws","/articles","/sitemap-routes","/articles/amazon-patches-high-severity-flaw-in-workspaces-linux-client","/articles/analysis-of-sophisticated-2025-npm-supply-chain-attacks-reveals-new-ttps","/articles/android-trojan-audiosignature-hijack-steals-data-without-mic-permissions","/articles/analysis-released-on-2026-rbi-and-sama-cybersecurity-mandates","/articles/anthropic-claude-code-vulnerabilities-allow-silent-system-takeover","/articles/apple-enhances-location-privacy-in-ios-26-3-update","/articles/apple-google-release-emergency-patches-for-ghosttouch-zero-click-flaw","/articles/apt-group-cavalry-werewolf-targets-russian-critical-infrastructure","/articles/apt-c-60-intensifies-cyber-espionage-campaign-against-japan","/articles/apt-silent-geese-targets-nato-diplomats-with-phishing-campaign","/articles/apple-patches-webkit-sop-bypass-flaw-cve-2026-20643-with-new-update-method","/articles/appsflyer-web-sdk-hijacked-in-supply-chain-attack","/articles/apple-supply-chain-alert-after-cyberattack-on-chinese-manufacturing-partner","/articles/apt-steelhydra-targets-geothermal-energy-sector-with-novel-ics-malware","/articles/apt28-linked-to-exploitation-of-microsoft-mshtml-zero-day","/articles/apt24-deploys-badaudio-malware-in-long-running-espionage-campaign-against-taiwan","/articles/armis-launches-new-select-partner-program-with-flexible-tier-free-model","/articles/astaroth-banking-trojan-spreads-via-whatsapp-worm-in-brazil","/articles/asahi-confirms-massive-data-breach-from-qilin-ransomware-attack","/articles/apt36-targets-indian-government-with-new-python-elf-malware","/articles/asahi-group-confirms-115k-records-leaked-in-2025-ransomware-attack","/articles/at-bay-report-cites-vpns-and-email-as-primary-ransomware-vectors","/articles/asimily-enhances-cyber-asset-management-with-microsegmentation-for-cisco-ise","/articles/atlassian-bulletin-details-21-high-severity-flaws-including-rces","/articles/anubis-raas-offers-destructive-wipe-mode-for-extortion","/articles/atlassian-races-to-patch-critical-confluence-zero-day-under-active-exploitation","/articles/atlassian-patches-critical-cvss-10-flaw-in-apache-tika-dependency","/articles/atos-partners-with-qevlar-ai-to-bolster-soc-with-virtual-analyst","/articles/att-investigates-massive-data-breach-of-70-million-customers","/articles/australia-issues-joint-advisory-on-inc-ransomware","/articles/australian-government-warns-of-badcandy-malware-targeting-cisco-devices","/","/articles/attackers-weaponize-decade-old-encase-driver-to-terminate-edr-products","/articles/apt28-unleashes-custom-malware-in-sustained-cyberespionage-campaign-against-ukraine","/articles/anubis-ransomware-targets-australian-engineering-firm","/articles/australian-fertility-clinic-genea-hit-by-termite-ransomware-gang","/articles/apple-patches-two-actively-exploited-zero-days-in-ios-26-2","/articles/apple-silently-patches-webkit-flaw-allowing-cross-site-data-access","/articles/australian-hacker-jailed-evil-twin-wifi-attacks","/articles/authorities-dismantle-cryptomixer-laundering-billions-in-crypto","/articles/authorities-dismantle-major-cybercrime-rings-in-africa","/articles/automated-extortion-attacks-wipe-exposed-mongodb-databases","/articles/aws-unveils-new-ai-powered-security-tools-at-reinvent-2025","/articles/aws-codebuild-codebreach-supply-chain-vulnerability","/articles/aws-us-east-1-outage-causes-global-service-disruption","/articles/baker-university-discloses-2024-data-breach-affecting-53000-individuals","/articles/barts-health-nhs-trust-hit-by-clop-ransomware-via-oracle-zero-day","/articles/bahrain-polytechnic-and-beyon-cyber-partner-on-ai-and-cybersecurity","/articles/betterment-data-breach-exposes-detailed-financial-info-of-1-4m-customers","/articles/battering-ram-hardware-attack-defeats-intel-sgx-amd-sev","/articles/betterment-data-breach-exposes-1-4-million-customers-after-social-engineering-attack","/articles/autumn-dragon-espionage-campaign-targets-southeast-asian-nations","/articles/blast-audit-and-safeporter-release-new-vulnerability-disclosure-policies","/articles/bitrefill-data-breach-linked-to-north-korean-hackers","/articles/bloody-wolf-apt-targets-russia-and-uzbekistan-with-netsupport-rat","/articles/bloody-wolf-apt-targets-central-asia-with-legitimate-rats","/articles/bridgepay-payment-platform-confirms-crippling-ransomware-attack","/articles/blue-star-reports-data-security-incident-involving-product-data","/articles/canada-computers-discloses-data-breach-affecting-guest-checkout-customers","/articles/black-basta-ransomware-exploits-windows-zero-day-vulnerability","/articles/breachforums-user-database-leaked-exposing-324000-cybercriminals","/articles/broadband-provider-brightspeed-investigates-breach-claim-by-crimson-collective","/articles/broadside-botnet-targets-maritime-sector-via-dvr-flaw","/articles/camoleak-flaw-in-github-copilot-allowed-silent-code-exfiltration","/articles/canadian-retailer-loblaw-investigates-data-breach-affecting-customer-information","/articles/california-enacts-stricter-data-breach-law-30-day-notification","/articles/canadian-telecom-giants-rogers-telus-freedom-mobile-disclose-data-breaches","/articles/canadian-cyber-centre-warns-of-ai-fueled-ransomware-threat","/articles/bulletproof-hosters-abuse-legitimate-isp-software-for-cybercrime-ops","/articles/canada-issues-national-alert-as-hacktivists-target-critical-infrastructure","/articles/bit-refill-accuses-north-korea-linked-hackers-of-cyber-attack","/articles/betvictor-online-gambling-site-reports-data-breach","/articles/canadian-tire-breach-exposes-38-million-accounts-due-to-cloud-misconfiguration","/articles/black-cat-group-uses-seo-poisoning-and-fake-notepad-sites-in-major-campaign","/articles/cerner-discloses-patient-data-breach-to-alaskan-hospital","/articles/central-maine-healthcare-discloses-data-breach-affecting-145000","/articles/ceos-cisos-split-on-ai-cybersecurity-risks-rewards-survey-finds","/articles/ceo-of-chinese-cybersecurity-firm-cnzxsoft-faces-court-ordered-sanctions","/articles/check-point-2026-cyber-security-report-ai-drives-attack-surge","/articles/carecloud-investigates-patient-data-leak-in-ehr-breach","/articles/china-aligned-apt-plushdaemon-deploys-edgestepper-network-implant","/articles/chaosbot-malware-uses-cisco-vpn-active-directory-passwords","/articles/canadian-tire-discloses-e-commerce-customer-data-breach","/articles/checkout-com-breached-by-shinyhunters-rejects-ransom","/articles/china-linked-amaranth-dragon-targets-southeast-asian-governments-with-winrar-exploit","/articles/china-linked-apt-salt-typhoon-targets-european-telecom","/articles/china-intensifies-cyber-campaign-against-taiwan-in-2025","/articles/china-linked-apt-red-menshen-deploys-bpfdoor-in-global-telecom-networks","/articles/china-linked-apt-exploits-cisco-email-gateway-zero-day","/articles/china-linked-unc6384-exploits-unpatched-windows-flaw-to-spy-on-european-diplomats","/articles/china-linked-apt-targets-north-american-critical-infrastructure","/articles/chatgpt-atlas-browser-vulnerability-allows-memory-poisoning","/articles/china-linked-group-uat9244-deploys-new-malware-against-south-american-telecoms","/articles/china-amends-cybersecurity-law-massively-increasing-penalties","/articles/chinas-cert-warns-of-security-risks-in-openclaw-ai-model","/articles/chinese-apt-evasive-panda-deploys-mgbot-backdoor-via-dns-poisoning","/articles/chinese-apt-flax-typhoon-uses-arcgis-server-as-backdoor-for-espionage","/articles/chinese-firm-knownsec-breached-exposing-state-hacking-tools-and-global-target-lists","/articles/chinese-hackers-used-chatgpt-for-influence-operations","/articles/chinese-apt-salt-typhoon-breaches-us-congressional-staff-emails","/articles/chrome-zero-day-exploited-in-espionage-campaign-by-mem3nt0-mori","/articles/chinese-apt-mustang-panda-renews-espionage-campaign-against-european-governments","/articles/chinese-apt-jewelbug-infiltrates-russian-it-provider-in-espionage-campaign","/articles/cisa-adds-actively-exploited-cisco-sd-wan-vulnerabilities-to-kev","/articles/cisa-adds-actively-exploited-fortinet-sso-vulnerability-to-kev-catalog","/articles/cisa-adds-actively-exploited-control-web-panel-flaw-to-kev-catalog","/articles/cisa-adds-actively-exploited-langflow-vulnerability-to-kev-catalog","/articles/cisa-adds-actively-exploited-solarwinds-whd-flaw-to-kev-catalog","/articles/cisa-adds-actively-exploited-rmm-flaws-from-beyondtrust-solarwinds-to-kev-catalog","/articles/cisa-adds-actively-exploited-watchguard-and-triofox-flaws-to-kev-catalog","/articles/cisa-adds-actively-exploited-windows-clfs-privilege-escalation-flaw-to-kev","/articles/cisa-adds-actively-exploited-wing-ftp-server-flaw-to-kev-catalog","/articles/chinese-apt-unc6201-exploits-dell-recoverpoint-zero-day-for-vmware-espionage","/articles/cisa-adds-actively-exploited-zimbra-xss-zero-day-to-kev-catalog","/articles/cisa-adds-actively-exploited-gladinet-cwp-flaws-to-kev-catalog","/articles/chronoleap-malware-emerges-with-novel-mfa-bypass-technique","/articles/cis-detects-malicious-crystal-pdf-converter-targeting-sltt-networks","/articles/cisa-adds-actively-exploited-gogs-rce-vulnerability-to-kev-catalog","/articles/chronolocker-ransomware-hits-global-logistics-giant-americargo","/articles/chinese-hackers-target-southeast-asian-militaries-with-custom-malware","/articles/cisa-adds-critical-motex-lanscope-vulnerability-to-kev-catalog","/articles/cisa-adds-exploited-openplc-xss-flaw-to-kev-catalog","/articles/cisa-adds-exploited-scadabr-vulnerability-to-kev-catalog","/articles/cisa-adds-exploited-trivy-and-langflow-flaws-to-kev-catalog","/articles/cisa-adds-four-actively-exploited-vulnerabilities-to-kev-catalog-january-2026","/articles/cisa-adds-four-actively-exploited-flaws-to-kev-catalog-feb-2026","/articles/cisa-adds-four-actively-exploited-vulnerabilities-to-kev-catalog-february-2026","/articles/cisa-adds-exploited-cisco-ivanti-flaws-to-kev-catalog","/articles/cisa-adds-five-actively-exploited-vulnerabilities-to-kev-catalog","/articles/cisa-adds-new-actively-exploited-vulnerability-to-kev-catalog","/articles/cisa-issues-13-advisories-for-industrial-control-systems","/articles/cisa-issues-advisory-for-rce-flaw-in-hitachi-energy-asset-suite","/articles/cisa-adds-zimbra-xss-flaw-to-known-exploited-vulnerabilities-catalog","/articles/cisa-and-fbi-release-guide-to-combat-malicious-bulletproof-hosting-providers","/articles/cisa-adds-exploited-fortinet-fortiweb-flaw-cve-2025-58034-to-kev-catalog","/articles/cisa-issues-advisories-for-widespread-industrial-control-system-flaws","/articles/cisa-exposes-critical-flaws-in-industrial-control-systems","/articles/cisa-adds-apple-laravel-craft-cms-flaws-to-kev-catalog","/articles/cisa-adds-two-actively-exploited-vulnerabilities-to-kev-catalog","/articles/cisa-issues-alert-on-sandviper-apt-targeting-defense-industrial-base","/articles/cisa-issues-emergency-directive-after-nation-state-actor-steals-f5-source-code","/articles/cisa-issues-alert-for-critical-flaws-in-veeder-root-fuel-gauge-systems","/articles/cisa-issues-new-guidance-for-exploited-cisco-asa-vulnerabilities","/articles/cisa-mandates-7-day-patch-for-actively-exploited-fortinet-fortiweb-zero-day-cve-2025-58034","/articles/cisa-updates-cybersecurity-performance-goals-for-critical-infrastructure","/articles/cisa-publishes-numerous-ics-advisories-for-energy-and-water-systems","/articles/cisa-orders-federal-agencies-to-remove-unsupported-end-of-life-edge-devices","/articles/cisa-orders-federal-agencies-to-remove-unsupported-edge-devices-from-networks","/articles/cisa-publishes-six-new-advisories-for-industrial-control-systems","/articles/cisa-orders-patch-for-actively-exploited-geoserver-xxe-vulnerability","/articles/cisa-under-fire-for-quietly-updating-ransomware-vulnerability-data","/articles/cisa-publishes-six-new-advisories-for-industrial-control-systems-ics","/articles/cisa-warns-of-actively-exploited-flaw-in-sierra-wireless-routers","/articles/cisa-warns-of-active-exploitation-of-critical-sharepoint-rce-flaw-cve-2026-20963","/articles/cisa-warns-of-actively-exploited-microsoft-sharepoint-vulnerabilities","/articles/cisa-warns-of-actively-exploited-flaws-in-dassault-systemes-manufacturing-software","/articles/cisa-warns-of-actively-exploited-smartermail-rce-flaw-in-ransomware-attacks","/articles/cisa-warns-of-actively-exploited-oracle-identity-manager-rce-flaw-cve-2025-61757","/articles/cisa-nsa-cccs-release-updated-analysis-on-brickstorm-malware-variant","/articles/cisa-warns-of-actively-exploited-rce-flaw-in-soliton-filezen","/articles/cisa-warns-of-actively-exploited-adobe-aem-flaw-with-cvss-10","/articles/cisa-warns-commercial-spyware-targets-signal-whatsapp-users","/articles/cisa-updates-report-on-state-sponsored-brickstorm-backdoor","/articles/cisa-mandates-patch-for-actively-exploited-windows-zero-day-cve-2026-20805","/articles/cisa-launches-be-air-aware-guides-to-defend-critical-infrastructure-from-drone-threats","/articles/cisa-issues-seven-advisories-for-critical-ics-vulnerabilities","/articles/cisa-warns-of-arbitrary-code-execution-vulnerability-in-watchguard-fireware-os","/articles/cisa-warns-of-bridgesiphon-zero-day-in-hybrid-cloud-interfaces","/articles/cisa-warns-of-critical-ironbite-zero-day-in-scada-systems","/articles/cisa-warns-of-destructive-cyberattacks-on-energy-grid","/articles/cisa-warns-of-critical-flaws-in-rockwell-automation-and-yosmart-ics-equipment","/articles/cisa-warns-of-critical-code-injection-flaw-in-schneider-electric-ics-software","/articles/cisa-warns-of-brickstorm-malware-used-by-chinese-hackers-against-us-government","/articles/cisco-f5-release-patches-for-high-severity-dos-rce-flaws","/articles/cisa-warns-of-actively-exploited-vmware-aria-operations-vulnerability","/articles/cisco-firewall-flaw-cve-2026-20131-exploited-as-zero-day-by-interlock-ransomware","/articles/cisco-patches-critical-rce-flaw-in-firewall-management-center","/articles/cisco-patches-critical-rce-flaw-in-ssm-on-prem","/articles/cisa-warns-of-actively-exploited-smartermail-rce-in-ransomware-attacks","/articles/cisco-patches-zero-day-info-disclosure-flaw-in-ise","/articles/cisco-patches-snort-3-flaws-allowing-dos-and-data-leaks","/articles/cisco-warns-active-zero-day-attacks-on-secure-email-gateway","/articles/cisco-sd-wan-zero-day-cve-2026-20127-exploited-since-2023","/articles/cisco-zero-day-cve-2025-20352-exploited-to-deploy-linux-rootkits-on-switches","/articles/cisco-shadow-persistence-rootkit-targets-edge-devices","/articles/cisco-warns-new-attack-variant-exploiting-critical-firewall-vulnerabilities","/articles/cisco-warns-of-actively-exploited-zero-day-rce-flaw-cve-2026-20045","/articles/cisco-warns-of-new-dos-attacks-targeting-secure-firewalls","/articles/cl0p-ransomware-breaches-logitech-via-oracle-e-business-suite-zero-day","/articles/clop-ransomware-breaches-american-airlines-subsidiary-via-oracle-ebs-flaw","/articles/clawjacked-websocket-hijacking-flaw-patched-in-openclaw-ai-agent","/articles/clop-exploits-oracle-ebs-zero-day-prompting-urgent-fbi-warning","/articles/clop-ransomware-gang-claims-attack-on-dartmouth-college","/articles/clop-ransomware-exploits-oracle-e-business-suite-zero-day","/articles/clop-ransomware-claims-attack-on-canadian-company-cmhheli","/articles/cloudflare-outage-caused-by-botched-emergency-patch-for-react2shell","/articles/clop-ransomware-gang-claims-breach-of-harvard-university","/articles/cloud-security-incidents-surge-costing-firms-over-5-million-per-breach","/articles/co-op-ceo-resigns-after-cyber-attack-contributes-to-126m-loss","/articles/code-to-cloud-attack-vector-abuses-github-pats","/articles/cloud-sweep-group-unleashes-phase-30-attacks-on-cold-storage-backups","/articles/colortokens-xshield-platform-achieves-fedramp-moderate-authorization","/articles/cognizant-subsidiary-trizetto-suffers-massive-healthcare-data-breach-affecting-3-4-million","/articles/claims-giant-sedgwick-hit-by-tridentlocker-ransomware-group","/articles/clop-exploits-critical-oracle-e-business-suite-zero-day-cve-2025-61882","/articles/cognizant-faces-class-action-lawsuits-over-trizetto-data-breach","/articles/clop-suspected-in-oracle-zero-day-attacks-on-upenn-and-university-of-phoenix","/articles/cloudflare-report-attackers-shift-from-breaking-in-to-logging-in","/articles/cl0p-ransomware-exploits-oracle-e-business-suite-zero-day-in-mass-attack","/articles/clop-ransomware-exploits-oracle-e-business-suite-zero-day-cve-2025-61882","/articles/city-of-gloversville-new-york-hit-by-ransomware-attack","/articles/comcast-fined-1-5m-by-fcc-over-vendor-data-breach","/articles/consulting-giant-ey-exposes-4tb-sql-database-to-internet","/articles/connectpos-exposed-admin-github-token-for-four-years","/articles/coordinated-cyberattack-targets-lithium-battery-storage-facilities","/articles/contagious-interview-and-crescentharvest-campaigns-target-crypto-and-dissidents","/articles/cooper-steel-fabricators-breach-amazon-data-center-blueprints-for-sale","/articles/conduent-breach-escalates-now-considered-largest-in-us-history","/articles/coordinated-cyberattack-disrupts-services-for-three-london-councils","/articles/conduent-data-breach-impact-surges-to-over-25-million-nationwide","/articles/coordinated-scams-target-mena-region-with-fake-online-job-advertisements","/articles/conduent-data-breach-impacts-10-million-in-major-healthcare-incident","/articles/coupang-discloses-massive-data-breach-affecting-33-7-million-users","/articles/coupang-swings-to-financial-loss-after-massive-2025-data-breach","/articles/coppersteal-malware-variant-targets-cloud-credentials","/articles/conduent-data-breach-swells-to-25-million-victims-after-safepay-ransomware-attack","/articles/conduent-data-breach-swells-to-25-million-victims-texas-ag-investigates","/articles/coordinated-gps-spoofing-attacks-disrupt-global-aviation-and-maritime-navigation","/articles/crimson-wyvern-apt-targets-cancer-research-institutes","/articles/crashfix-campaign-uses-fake-ad-blocker-to-crash-browsers-and-push-malware","/articles/critical-adobe-commerce-flaw-cve-2025-54236-under-active-exploitation","/articles/critical-9-9-cvss-zero-day-vulnerability-disclosed-in-beyondtrust-products","/articles/critical-authentication-bypass-and-rce-flaws-patched-in-freepbx","/articles/critical-apache-tomcat-flaws-expose-servers-to-rce-and-console-manipulation","/articles/critical-command-injection-flaw-cve-2025-53967-patched-in-figma-tool","/articles/critical-bluetooth-flaw-in-whill-wheelchairs-allows-remote-takeover-cve-2025-14346","/articles/critical-django-vulnerabilities-enable-dos-and-sql-injection","/articles/critical-flaw-in-connectwise-screenconnect-allows-session-hijacking","/articles/critical-flaw-in-wordpress-plugin-woocommerce-designer-pro-allows-file-deletion","/articles/critical-nginx-ui-vulnerability-cve-2026-27944-allows-unauthenticated-backup-theft","/articles/critical-cisco-sd-wan-flaw-cve-2026-20127-under-active-exploitation","/articles/critical-f5-big-ip-vulnerability-cve-2025-53521-reclassified-and-exploited","/articles/critical-ptc-windchill-flaw-triggers-unprecedented-police-mobilization-in-germany","/articles/critical-nodejs-flaw-in-binary-parser-library-allows-code-execution-cve-2026-1245","/articles/critical-privilege-escalation-flaw-in-prime-listing-manager-wordpress-plugin","/articles/critical-flaws-in-runc-container-runtime-threaten-docker-kubernetes","/articles/critical-rce-flaw-cve-2025-12556-in-idis-cloud-manager-viewer","/articles/critical-authentication-bypass-flaw-disclosed-in-honeywell-cctv-cameras","/articles/critical-rce-flaw-cve-2025-68613-in-n8n-automation-platform-risks-103k-servers","/articles/critical-beyondtrust-vulnerability-exploited-in-active-attacks","/articles/critical-openssh-flaw-affects-moxa-industrial-switches","/articles/critical-cvss-10-vulnerability-in-grafana-enterprise-allows-admin-impersonation","/articles/critical-rce-flaw-cve-2025-59287-in-windows-server-update-services","/articles/critical-azure-bastion-flaw-cve-2025-49752-allows-complete-cloud-takeover","/articles/critical-rce-vulnerability-in-n8n-automation-platform-allows-server-compromise","/articles/critical-rce-flaw-in-w3-total-cache-wordpress-plugin-endangers-1-million-sites","/articles/critical-citrix-netscaler-flaw-cve-2026-3055-exposes-sensitive-data","/articles/critical-rce-flaw-in-smartermail-threatens-mail-servers","/articles/critical-rce-vulnerability-cve-2026-2329-in-grandstream-voip-phones","/articles/critical-sql-injection-and-authorization-flaws-disclosed-with-public-exploits","/articles/critical-rce-zero-day-in-nexusflow-api-gateway-actively-exploited","/articles/critical-sql-injection-flaw-in-oneuptime-platform","/articles/critical-screenconnect-auth-bypass-vulnerability-cve-2026-1014-exploited","/articles/critical-rce-flaws-in-ai-inference-engines-expose-major-tech-frameworks","/articles/critical-react2shell-rce-vulnerability-in-react-and-nextjs-sparks-emergency-patching","/articles/critical-rce-flaw-in-xspeeder-sxzos-allows-unauthenticated-root-access","/articles/critical-react2shell-rce-flaw-disclosed-in-react-and-nextjs","/articles/critical-rce-vulnerability-in-react-native-npm-package-cve-2025-11953","/articles/critical-react2shell-and-windows-zero-day-vulnerabilities-under-active-exploitation","/articles/critical-sql-injection-vulnerability-cve-2025-64459-in-django","/articles/critical-supply-chain-risk-uncovered-in-vscode-extension-marketplaces","/articles/critical-unauthenticated-rce-flaw-cvss-10-in-n8n-automation-tool","/articles/critical-vulnerability-gnu-wget2-allows-arbitrary-file-overwrite-cve-2025-69194","/articles/critical-unauthenticated-rce-vulnerability-in-langflow-ai-platform","/articles/critical-unisoc-modem-flaw-allows-rce-via-cellular-call","/articles/critical-vulnerability-in-tp-link-vigi-cameras-allows-remote-hacking","/articles/critical-zero-click-rce-vulnerability-discovered-in-telegram-messenger","/articles/critical-vulnerabilities-disclosed-in-airoha-bluetooth-chips","/articles/critical-xss-flaw-cve-2025-68876-in-wordpress-plugin-invelity-sps-connect","/articles/critical-zero-day-in-netty-library-allows-email-auth-bypass","/articles/crowdstrike-partners-with-schwarz-digits-for-sovereign-ai-security","/articles/cyberattack-disrupts-operations-at-dresden-state-art-collections","/articles/cve-2025-34775-rejected-in-national-vulnerability-database","/articles/cyber-attack-disrupts-parking-payments-in-russian-city","/articles/cyber-surge-operation-dismantles-major-phishing-as-a-service-platform","/articles/cybercriminals-hijack-digital-logistics-for-physical-cargo-theft","/articles/crowdstrike-fires-employee-for-leaking-internal-data-to-hacking-group","/articles/crypto-worth-over-35m-stolen-using-data-from-2022-lastpass-breach","/articles/cyber-roundup-codered-ransomware-wall-street-hack-donbas-post-attack","/articles/darktrace-appoints-terry-doyle-as-first-chief-information-officer","/articles/darksword-ios-exploit-chain-actively-used-in-targeted-attacks","/articles/daily-ransomware-report-qilin-gang-dominates-november-8-2025","/articles/daedong-usa-kioti-tractor-expands-scope-of-2024-data-breach","/articles/cybersecurity-insiders-plead-guilty-to-alphv-blackcat-ransomware-attacks","/articles/darktrace-launches-ai-powered-real-time-security-coaching","/articles/darktrace-report-supply-chain-attacks-and-ai-phishing-escalate-in-apj","/articles/crowdstrike-named-aws-global-security-marketplace-partner-of-the-year-2025","/articles/data-breach-at-london-councils-exposes-residents-personal-information","/articles/crypto-platform-shuffle-hit-by-third-party-data-breach","/articles/cyberattacks-on-automotive-and-logistics-supply-chains-skyrocket","/articles/cuttlefish-malware-infects-routers-to-spy-on-network-traffic","/articles/dell-patches-critical-privilege-escalation-vulnerability-in-data-lakehouse","/articles/def-con-bans-three-tech-figures-over-jeffrey-epstein-connections","/articles/data-breaches-hit-toys-r-us-askul-verisure","/articles/critical-zero-click-rce-vulnerability-in-openclaw-ai-framework","/articles/dell-recoverpoint-zero-day-cve-2026-22769-exploited-by-chinese-espionage-group","/articles/deloitte-agrees-to-6-3-million-settlement-for-rhode-island-data-breach","/articles/dentsu-subsidiary-merkle-hit-by-cyberattack-exposing-data","/articles/dhs-breach-fema-cbp-data-exposed-via-citrix-zero-day","/articles/devman-ransomware-group-claims-attack-on-us-financial-firm-sharinc","/articles/debian-patches-high-severity-sql-injection-flaw-cve-2025-12819-in-pgbouncer","/articles/datzbro-trojan-targets-seniors-via-ai-powered-facebook-scams","/articles/deadlock-ransomware-deploys-byovd-tactic-to-disable-edr","/articles/ddos-attack-russian-food-safety-agency-disrupts-supply-chain","/articles/deepload-malware-combines-ai-generated-code-and-clickfix-to-evade-detection","/articles/diesel-vortex-phishing-campaign-targets-us-european-logistics-firms","/articles/digicloud-africa-partners-with-google-to-distribute-secops-platform","/articles/dhs-subpoenas-tech-firms-for-identities-of-ice-critics","/articles/discord-confirms-data-breach-via-third-party-support-vendor","/articles/discord-denies-breach-as-hackers-claim-to-leak-1-5tb-of-user-data","/articles/discord-delays-global-age-verification-policy-after-backlash","/articles/discord-vendor-breach-exposes-70000-users-government-ids","/articles/dragos-report-industrial-cyber-threats-shift-from-espionage-to-physical-disruption","/articles/disgruntled-affiliate-leaks-inner-workings-of-the-gentlemen-ransomware","/articles/dods-cmmc-program-officially-begins-phased-rollout","/articles/dragonforce-ransomware-claims-attack-on-us-bank-uinta-bank","/articles/dragonforce-ransomware-attacks-brazilian-university-fgv","/articles/dragonforce-ransomware-claims-attack-on-us-hydraulics-firm-dynex-rivett","/articles/dutch-prison-agency-data-exposed-for-five-months-in-government-hack","/articles/dutch-telecom-giant-odido-suffers-major-data-breach-affecting-6-2-million-customers","/articles/drones-pose-growing-cyber-attack-threat-to-critical-infrastructure","/articles/ericsson-discloses-data-breach-affecting-15000-via-third-party-vendor","/articles/emeditor-website-hacked-to-distribute-infostealer-malware","/articles/dutch-telecom-odido-announces-data-breach-affecting-millions-of-customers","/articles/eswatini-cybersecurity-crisis-amidst-government-inaction","/articles/escan-antivirus-compromised-in-supply-chain-attack-delivers-malware","/articles/eu-finds-meta-and-tiktok-in-preliminary-breach-of-digital-services-act","/articles/eth-zurich-study-finds-gaps-in-zero-knowledge-password-managers","/articles/eu-commission-grants-unconditional-approval-for-google-32b-acquisition-of-wiz","/articles/eu-launches-cybersecurity-reserve-to-bolster-incident-response","/articles/eu-and-australia-issue-new-cybersecurity-guidance","/articles/doordash-discloses-data-breach-after-employee-falls-for-social-engineering-scam","/articles/eu-cybersecurity-rules-nis2-directive-in-full-force","/articles/doordash-discloses-new-breach-via-third-party-vendor","/articles/dragonforce-emerges-as-new-ransomware-cartel-using-lockbit-and-conti-code","/articles/dragonforce-ransomware-emerges-from-leaked-conti-code-with-cartel-model","/articles/dotnet-soapwn-flaw-enables-authentication-bypass-and-rce","/articles/eu-fines-connectsphere-800m-for-gdpr-violations","/articles/eu-tests-joint-cyber-crisis-response-in-blueolex-2025-exercise","/articles/europe-is-2-global-ransomware-target-attacks-accelerating-crowdstrike-report","/articles/european-commission-contains-cyberattack-on-mobile-device-management-system","/articles/european-commission-proposes-revisions-to-strengthen-eu-cybersecurity-act","/articles/european-commission-suffers-cloud-breach-data-exfiltrated-from-aws-infrastructure","/articles/european-organizations-targeted-by-phishing-campaign-using-html-smuggling-and-telegram-bots","/articles/eu-sanctions-chinese-and-iranian-firms-for-malicious-cyber-activities","/articles/eu-ukraine-bolster-cyber-cooperation-amidst-russian-threats","/articles/eu-moves-forward-with-cyber-resilience-act-cra-implementation","/articles/eurofiber-breach-exposes-data-from-thales-orange-and-french-government","/articles/eu-public-administrations-face-surging-ddos-and-data-threats-enisa-reports","/articles/eu-proposes-revised-cybersecurity-act-to-ban-high-risk-tech-suppliers","/articles/everest-ransomware-claims-major-data-breach-at-mcdonalds-india","/articles/european-union-to-mandate-ai-data-poisoning-vetting","/articles/everest-ransomware-claims-collins-aerospace-breach-then-site-goes-offline","/articles/evelyn-stealer-malware-targets-developers-via-malicious-vs-code-extensions","/articles/european-space-agency-probes-breach-of-external-engineering-servers","/articles/everest-ransomware-claims-under-armour-breach-leaks-data-of-72m-customers","/articles/everest-ransomware-group-attacks-japanese-manufacturer-hosokawa-micron","/articles/everest-ransomware-claims-theft-of-1tb-data-from-chrysler","/articles/everest-ransomware-group-leaks-343gb-of-under-armour-customer-data","/articles/fake-job-phishing-campaign-targets-marketing-professionals","/articles/everest-ransomware-group-claims-major-breach-at-nissan","/articles/fbi-warns-of-nationwide-phishing-scam-impersonating-city-officials-for-permit-fees","/articles/eviltokens-phishing-as-a-service-abuses-oauth-device-flow","/articles/f5-discloses-nation-state-breach-source-code-stolen","/articles/fake-windows-activation-site-distributes-cosmali-loader-malware","/articles/fbi-seizes-ramp-ransomware-forum-in-major-takedown-operation","/articles/fcc-rescinds-isp-cybersecurity-rules-amidst-ongoing-threats","/articles/fcc-bans-all-foreign-produced-consumer-routers-over-security-risks","/articles/fakebat-malware-loader-spreads-via-malicious-ads","/articles/fbi-warns-of-north-korean-quishing-campaigns-using-malicious-qr-codes","/articles/fake-movie-torrent-spreads-agent-tesla-malware","/articles/fcc-urges-us-telecoms-to-bolster-defenses-against-rising-ransomware-attacks","/articles/fedora-issues-security-advisory-for-python-aiohttp-flaw","/articles/fcc-warns-telecoms-of-increasing-ransomware-threats","/articles/financial-firms-boost-cyber-budgets-and-board-oversight-moodys-report","/articles/ex-diplomat-warns-india-may-lose-autonomy-for-efficiency-by-relying-on-foreign-ai","/articles/figure-technologies-confirms-data-breach-after-phishing-attack","/articles/fdd-submits-public-comment-to-nist-on-mounting-agentic-ai-security-risks","/articles/financial-sector-cyberattacks-doubled-in-2025-fueled-by-hacktivism","/articles/fake-ransomware-group-0apt-bluffs-australian-hospital-in-extortion-attempt","/articles/experian-forecasts-ai-agents-to-become-top-cause-of-data-breaches","/articles/fake-line-installer-spreads-valleyrat-malware","/articles/fortinet-confirms-active-exploitation-of-forticloud-sso-bypass","/articles/fintech-startup-voltpay-exposes-5-million-customer-records-in-cloud-leak","/articles/fincen-report-reveals-2-1-billion-in-ransomware-payments-since-2022","/articles/first-ai-orchestrated-cyber-espionage-campaign-disrupted","/articles/fintech-app-paysphere-breach-exposes-4-million-users-data","/articles/fortinet-patches-exploited-fortiweb-path-traversal-zero-day","/articles/f5-discloses-nation-state-breach-cisa-issues-emergency-directive","/articles/fortinet-silently-patches-actively-exploited-fortiweb-zero-day","/articles/fortinet-fixes-actively-exploited-sso-authentication-bypass-flaw","/articles/finland-arrests-two-in-probe-of-damaged-undersea-telecom-cable","/articles/fortinet-discloses-high-severity-fortios-cli-vulnerability","/articles/fortinet-patches-critical-flaws-in-fortigate-firewalls-under-active-attack","/articles/financial-sector-faces-systemic-supply-chain-risk-and-indirect-ransomware","/articles/fintech-firm-700credit-discloses-data-breach-affecting-5-6-million","/articles/fortinet-sso-bypass-vulnerabilities-under-active-attack","/articles/france-cyberattack-compromises-medical-data-of-15-million-people","/articles/foster-city-declares-state-of-emergency-after-cyberattack-hits-services","/articles/freedom-mobile-discloses-data-breach-via-subcontractor-credentials","/articles/freedom-mobile-discloses-data-breach-via-compromised-subcontractor-account","/articles/french-bank-customers-targeted-in-quishing-scam-with-fake-cards","/articles/french-government-database-breached-exposing-1-2-million-bank-accounts","/articles/french-football-federation-data-breach-compromised-account","/articles/french-interior-ministry-confirms-cyberattack-on-email-servers","/articles/french-immigration-agency-data-leaked-via-third-party-contractor-breach","/articles/g7-publishes-framework-for-coordinated-cyber-response-in-financial-sector","/articles/geopolitical-tensions-raise-alarms-over-cyber-spillover","/articles/gcore-report-ddos-attacks-surge-150-with-growing-sophistication","/articles/g20-nations-sign-new-data-sovereignty-protocol","/articles/g7-issues-roadmap-for-post-quantum-cryptography-in-financial-sector","/articles/germany-signals-major-policy-shift-to-legalize-offensive-cyber-operations","/articles/geopolitical-tensions-spark-surge-in-middle-east-cyber-hostilities","/articles/github-discussions-weaponized-for-developer-phishing","/articles/ghostposter-malware-infects-50000-firefox-users-via-malicious-add-ons","/articles/glassworm-malware-targets-macos-developers-via-vs-code-extensions","/articles/ghostpairing-attack-hijacks-whatsapp-accounts-via-device-linking","/articles/germany-summons-russian-ambassador-over-air-traffic-control-hack-allegations","/articles/github-hosted-phishing-campaign-targets-developers-with-fake-openclaw-crypto-airdrop","/articles/ghosttouch-zero-day-exploit-for-mobile-os-allows-silent-app-installation","/articles/glassworm-worm-hits-vs-code-devs-in-supply-chain-attack","/articles/ftc-penalizes-illuminate-education-for-student-data-breach","/articles/georgia-tech-research-exposes-weaknesses-in-threat-intelligence-supply-chain","/articles/global-agencies-launch-effort-against-bulletproof-hosting-providers","/articles/global-cybersecurity-incidents-surge-with-state-sponsored-attacks","/articles/genesis-ransomware-group-claims-attack-on-sierra-management-group","/articles/g7-experts-warn-of-ai-risks-in-financial-cybersecurity","/articles/g7-cyber-experts-issue-statement-on-managing-ai-risks-in-financial-sector","/articles/fully-patched-fortigate-firewalls-compromised-via-sso-bypass","/articles/gnu-inetutils-flaw-allows-remote-authentication-bypass-in-telnet-cve-2026-24061","/articles/google-disrupts-chinese-cyber-espionage-campaign-unc2814","/articles/google-entrust-partner-on-ai-powered-identity-verification","/articles/google-investigates-malicious-code-anomaly-in-search-results-infrastructure","/articles/google-gemini-prompt-injection-flaw-exposes-private-calendar-data","/articles/google-finalizes-acquisition-of-cloud-security-firm-wiz","/articles/google-disrupts-sprawling-chinese-espionage-campaign-unc2814","/articles/google-issues-february-2026-security-update-for-pixel-devices","/articles/global-law-enforcement-busts-major-iot-ddos-botnet-rings","/articles/google-details-widespread-cyber-threats-targeting-defense-industrial-base","/articles/globalpay-payment-processor-breach-exposes-20-million-credit-cards","/articles/gobuteforcer-botnet-exploits-weak-credentials-on-linux-servers","/articles/global-infrastructure-breach-reports-confirmed-as-false-alarm","/articles/google-links-russian-state-actor-to-canfail-malware-in-ukraine","/articles/google-m-trends-report-initial-access-handoff-shrinks-to-22-seconds","/articles/google-patches-107-android-flaws-including-two-actively-exploited-zero-days","/articles/google-patches-actively-exploited-chrome-zero-day-december-2025","/articles/google-patches-actively-exploited-qualcomm-zero-day-in-android","/articles/google-patches-critical-android-zero-click-rce-vulnerability-cve-2025-48593","/articles/google-patches-critical-remote-code-execution-flaws-in-chrome","/articles/google-patches-critical-rce-flaw-cve-2025-12036-in-chrome-v8-engine","/articles/google-patches-high-risk-chrome-webview-security-bypass-flaw","/articles/google-patches-first-actively-exploited-chrome-zero-day-of-2026","/articles/hacker-ghostcrawl-claims-breach-of-team4security-demands-ransom","/articles/gtmaritime-launches-gt-identify-to-bolster-maritime-cybersecurity-compliance","/articles/grandstream-voip-phone-vulnerability-cve-2026-21486-allows-eavesdropping","/articles/google-releases-october-2025-security-update-for-pixel-devices","/articles/hacker-leaks-2-3-million-wired-subscriber-records-threatens-more","/articles/government-contractor-conduent-breach-exposes-data-of-10-million","/articles/hamas-affiliated-apt-ashen-lepus-deploys-new-ashtag-malware","/articles/hackers-target-critical-ics-ot-environments-and-ai-systems","/articles/guidance-on-protecting-critical-infrastructure-with-limited-budgets","/articles/hacktivists-and-cybercriminals-expand-attacks-on-ics-and-ai-systems","/articles/hacker-used-ai-chatbot-claude-to-breach-mexican-government-agencies","/articles/hacktivist-group-annas-archive-claims-massive-spotify-music-scrape","/articles/hackers-claim-breach-of-russian-nuclear-waste-facility-radon","/articles/half-of-pe-backed-firms-have-high-cyber-risk-report-finds","/articles/hawksec-group-claims-massive-data-breach-at-totalenergies","/articles/hasbro-reports-network-breach-and-initiates-investigation","/articles/harvard-university-discloses-data-breach-from-phone-phishing-attack","/articles/google-patches-two-actively-exploited-chrome-zero-day-vulnerabilities","/articles/handala-group-exposes-israeli-sigint-agents-in-telegram-compromise","/articles/gru-linked-hackers-bluedelta-apt28-evolve-credential-harvesting-tactics","/articles/google-security-operations-enhances-access-control-with-iam-integration","/articles/high-severity-code-injection-flaw-in-open-webui-disclosed","/articles/hp-report-cybercriminals-using-sophisticated-social-engineering-lures","/articles/healthcare-data-breaches-affect-modmed-lifebridge-right-at-home","/articles/herodotus-android-malware-mimics-human-typing-to-evade-detection","/articles/group-ib-report-supply-chain-attacks-evolving-into-top-global-threat","/articles/google-patches-sixth-actively-exploited-chrome-zero-day-cve-2025-10585","/articles/high-severity-flaws-in-n8n-workflow-platform-allow-rce","/articles/hpe-oneview-critical-rce-vulnerability-cve-2025-37164","/articles/hightower-holding-discloses-data-breach-affecting-131000-clients","/articles/healthcare-ransomware-attacks-shift-to-vendors-surging-30-percent","/articles/healthcare-breaches-double-amid-shadow-ai-and-vendor-risk","/articles/hhs-division-releases-new-healthcare-cybersecurity-toolkit","/articles/honeymyte-apt-evolves-with-kernel-mode-rootkit-to-deploy-toneshell-backdoor","/articles/healthcare-provider-qualderm-suffers-data-breach-affecting-3-1-million","/articles/huntress-2026-threat-report-cybercrime-industrializes-with-scalable-attacks","/articles/hpe-patches-critical-10-0-cvss-flaw-in-oneview-management-tool","/articles/health-isac-report-highlights-ai-driven-attacks-as-top-concern-for-2026","/articles/hungarian-political-party-tisza-suffers-major-data-breach","/articles/hypervisor-ransomware-attacks-surge-over-700-percent-led-by-akira","/articles/hyundai-autoever-america-data-breach-exposes-ssns-drivers-licenses","/articles/hyundai-autoever-notifies-customers-of-major-data-breach","/articles/ibm-issues-critical-security-updates-for-enterprise-products","/articles/ibm-warns-critical-auth-bypass-flaw-in-api-connect-platform","/articles/i-paid-twice-phishing-campaign-targets-booking-com-hotels-and-guests","/articles/ibm-and-turing-space-advance-digital-identity-solutions","/articles/india-implements-new-telecom-cybersecurity-rules-for-imei-and-mobile-validation","/articles/identity-service-providers-cgi-group-and-aura-suffer-data-breaches","/articles/inc-ransomware-targets-two-us-law-firms","/articles/illinois-dhs-data-breach-exposes-700000-residents","/articles/incransom-gang-claims-20tb-data-theft-from-evolve-mortgage-services","/articles/india-revokes-order-for-pre-installed-government-app","/articles/indian-government-confirms-gps-spoofing-at-major-airports","/articles/indias-chief-justice-calls-forensic-science-a-protective-shield-in-digital-age","/articles/infostealers-create-feedback-loop-hijacking-websites-for-malware-distribution","/articles/industrial-control-systems-face-escalating-cyber-threats","/articles/ingress-nginx-vulnerability-allows-arbitrary-code-execution","/articles/infutor-data-breach-reportedly-exposes-676-million-records","/articles/indian-banking-sector-turns-to-ai-for-fraud-detection-amid-rising-cyberattacks","/articles/infoblox-to-acquire-axur-to-bolster-external-threat-takedown-capabilities","/articles/instagram-data-leak-exposes-17-5-million-users","/articles/ingram-micro-discloses-ransomware-attack-impacting-42000-individuals","/articles/insecure-security-training-apps-expose-cloud-infrastructure-at-major-firms","/articles/interlock-ransomware-exploited-cisco-firewall-zero-day-before-patch","/articles/ibm-x-force-report-ai-powered-ransomware-on-the-rise","/articles/inc-ransomware-opsec-fail-allows-data-recovery-for-12-us-firms","/articles/identity-is-the-new-perimeter-cloud-attacks-driven-by-stolen-credentials","/articles/incident-responders-indicted-for-alphv-blackcat-ransomware-attacks","/articles/iran-linked-dust-specter-apt-targets-iraqi-government-officials","/articles/international-operation-disrupts-tycoon-2fa-phishing-as-a-service-platform","/articles/identity-firm-aura-exposes-900k-records-in-vishing-attack","/articles/iran-linked-muddywater-apt-deploys-muddyviper-backdoor","/articles/iran-linked-muddywater-apt-deploys-rustywater-rat-in-middle-east","/articles/iran-linked-redkitten-campaign-targets-human-rights-ngos","/articles/iran-linked-hackers-breach-personal-email-of-fbi-director-kash-patel","/articles/iran-linked-muddywater-apt-targets-governments-with-phoenix-backdoor","/articles/iran-linked-pay2key-ransomware-hit-us-healthcare-org-during-conflict","/articles/international-law-enforcement-dismantles-leakbase-hacker-forum","/articles/interpol-operation-red-card-2-arrests-651-for-online-fraud-in-africa","/articles/interlock-ransomware-exploited-critical-cisco-firewall-zero-day-for-over-a-month","/articles/iran-bans-government-officials-from-using-internet-connected-devices","/articles/investment-firm-hennessy-advisors-discloses-year-old-data-breach","/articles/iranian-apt-spearspecter-targets-officials-families-in-sophisticated-spy-campaign","/articles/iranian-apt-prince-of-persia-re-emerges-with-new-malware","/articles/iranian-apt-ferocious-kitten-targets-dissidents-with-markirat-malware","/articles/iranian-groups-launch-great-epic-wiper-attack-campaign","/articles/iranian-hackers-launch-coordinated-password-spray-attacks-on-middle-east","/articles/irleaks-breach-at-iranian-banks-exposes-millions-via-third-party-vendor","/articles/jaguar-land-rover-begins-phased-production-restart-after-cyberattack","/articles/ivanti-patches-two-critical-actively-exploited-rce-flaws-in-epmm","/articles/israeli-defense-firm-maya-targeted-in-hacktivist-attack","/articles/ivanti-discloses-13-vulnerabilities-in-endpoint-manager","/articles/italian-it-firm-almaviva-hit-by-cyberattack-2-3tb-of-data-leaked","/articles/jumpcloud-launches-ai-tools-for-identity-management-and-shadow-ai-governance","/articles/kaplan-north-america-data-breach-investigation-concludes","/articles/kazakhstan-releases-updated-national-cybersecurity-recommendations","/articles/kaspersky-report-malicious-scripts-phishing-surge-in-east-asian-ics","/articles/kaplan-data-breach-impacts-over-230000-individuals-across-seven-states","/articles/kaspersky-uncovers-phishing-technique-abusing-no-code-platform-bubble","/articles/key-us-cyber-information-sharing-law-expires-sparking-concerns","/articles/kenyan-government-websites-knocked-offline-in-defacement-attack","/articles/keenadu-android-backdoor-injects-into-zygote-process-links-botnets","/articles/killsec-ransomware-group-attacks-daba-finance","/articles/kaspersky-details-q3-apt-attacks-on-industrial-organizations-winrar-zero-day","/articles/konni-apt-abuses-google-find-hub-for-remote-data-wipes","/articles/killsec-ransomware-strikes-indonesian-fintech-firm-walletku","/articles/killsec-ransomware-gang-targets-nigerian-startup-getly","/articles/korean-air-supply-chain-breach-clop-ransomware-oracle-zero-day","/articles/kimwolf-botnet-infects-over-2-million-android-devices","/articles/korean-air-subsidiary-breach-exposes-30000-employee-records","/articles/juniper-networks-patches-220-vulnerabilities-nine-critical","/articles/jackson-county-sheriffs-office-network-crippled-by-ransomware-attack","/articles/jordanian-access-broker-pleads-guilty-to-selling-network-access","/articles/jfrog-uncovers-critical-zero-days-in-pytorch-scanning-tool-picklescan","/articles/jewett-cameron-operations-disrupted-by-ransomware-attack","/articles/la-sapienza-university-in-rome-suffers-major-cyberattack","/articles/lawsuit-filed-against-south-carolina-school-district-after-ransomware-attack","/articles/lapsus-hacking-group-reemerges-claims-astrazeneca-data-breach","/articles/large-scale-botnet-targets-rdp-services-in-us","/articles/leader-of-black-basta-ransomware-on-eu-most-wanted-list","/articles/lazarus-apts-remote-it-worker-infiltration-scheme-exposed","/articles/lazarus-group-deploys-medusa-ransomware-in-extortion-campaigns","/articles/lastpass-warns-of-active-phishing-campaign-impersonating-brand","/articles/lastpass-warns-of-phishing-campaign-impersonating-maintenance-alerts","/articles/lar-blinding-attacks-on-autonomous-cars-use-lasers-to-trick-sensors","/articles/landfall-spyware-exploits-samsung-zero-day-via-whatsapp","/articles/latin-america-faces-double-the-cyberattacks-of-us-report-finds","/articles/kremlin-hackers-target-ukrainian-military-with-pluggyape-malware","/articles/leaked-lockbit-3-0-ransomware-builder-fuels-new-wave-of-attacks","/articles/legacy-professionals-llp-reports-data-breach-affecting-215000","/articles/legacy-python-zc-buildout-scripts-pose-domain-takeover-risk","/articles/legitimate-dfir-tool-velociraptor-weaponized-in-ransomware-attacks","/articles/lending-platform-prosper-reports-data-breach-affecting-17-million","/articles/lexisnexis-data-breach-fulcrumsec-leaks-internal-files","/articles/linkedin-private-messages-abused-in-phishing-campaign-targeting-execs","/articles/lockbit-ransomware-deployed-via-apache-activemq-flaw","/articles/linkedin-phishing-campaign-targets-finance-execs-with-fake-board-invites","/articles/major-unnamed-tech-firm-suffers-breach-exposing-millions-of-users","/articles/lockbit-5-0-ransomware-targets-greek-luxury-hotel-group-em-resorts","/articles/makop-ransomware-campaign-evolves-with-guloader-and-new-exploits","/articles/major-telehealth-platform-breach-exposes-30-million-patient-video-records","/articles/malicious-chrome-extensions-caught-hijacking-enterprise-user-sessions","/articles/malicious-ai-skills-proliferate-on-clawhub-marketplace","/articles/malaysian-car-park-operator-imej-parking-suffers-major-data-leak","/articles/logitech-confirms-data-breach-by-clop-ransomware-via-oracle-zero-day","/articles/majority-of-us-state-legislators-data-exposed-in-breaches","/articles/malicious-clawdbot-agent-in-vs-code-marketplace-deployed-rat-malware","/articles/malicious-ai-browser-extensions-harvest-user-data-and-llm-prompts","/articles/malicious-logic-bombs-found-in-popular-coding-extensions","/articles/malicious-npm-packages-target-n8n-automation-platform-in-supply-chain-attack","/articles/malicious-chrome-extensions-steal-ai-chat-data-from-900k-users","/articles/malicious-chatgpt-chrome-extensions-hijack-user-sessions","/articles/malicious-nuget-packages-contain-time-delayed-industrial-sabotage-code","/articles/lockbit-ransomware-returns-with-upgraded-version-5-0","/articles/malicious-github-fork-of-triton-app-delivers-windows-malware","/articles/malicious-go-packages-impersonate-google-uuid-library-in-supply-chain-attack","/articles/macos-users-targeted-by-clickfix-campaign-distributing-infiniti-stealer","/articles/malicious-code-found-in-pyutils-core-python-library","/articles/lumifi-partners-with-vizient-to-strengthen-healthcare-cybersecurity","/articles/maguen-group-launches-fortem-cybersecurity-to-global-market","/articles/maas-operation-graybravo-distributes-castleloader-to-multiple-threat-clusters","/articles/manufacturers-targeted-in-supply-chain-attacks-via-web-portals","/articles/malicious-trust-wallet-chrome-extension-leads-to-7m-crypto-theft","/articles/manomano-data-breach-exposes-38-million-customers-via-third-party","/articles/marquis-revises-data-breach-impact-down-to-672000-individuals","/articles/malterminal-malware-uses-gpt4-to-generate-ransomware","/articles/marquis-health-services-blames-ransomware-on-sonicwall-cloud-backup-compromise","/articles/marquis-software-breach-exposes-data-from-74-banks-and-credit-unions","/articles/mango-discloses-data-breach-via-third-party-marketing-vendor","/articles/malicious-vs-code-extension-with-ransomware-found-on-marketplace","/articles/marquis-software-supply-chain-breach-hits-dozens-of-us-banks","/articles/marquis-sues-sonicwall-over-supply-chain-breach-leading-to-ransomware","/articles/malicious-rust-package-evm-units-targets-web3-developers","/articles/malicious-sleepyduck-extension-appears-in-open-vsx-marketplace","/articles/malicious-python-packages-on-pypi-deliver-rat","/articles/mass-defacement-campaign-hits-over-7500-magento-sites","/articles/mass-exploit-campaign-targets-adobe-coldfusion-servers-on-christmas","/articles/massive-149m-credential-leak-exposes-gmail-facebook-financial-services","/articles/massive-att-dataset-with-social-security-numbers-resurfaces-online","/articles/massive-data-breach-at-kenyan-health-platform-m-tiba-hits-millions","/articles/methodist-homes-discloses-data-breach-affecting-26000","/articles/massive-token-farming-campaign-abuses-npm-registry-150k-packages","/articles/massive-npm-supply-chain-attack-spreads-shai-hulud-worm","/articles/medusa-ransomware-group-escalates-attacks-in-africa","/articles/microsoft-april-2024-patch-tuesday-fixes-149-vulnerabilities","/articles/massive-infostealer-campaign-exposes-183-million-credentials","/articles/massive-data-leak-exposes-records-of-45-million-french-citizens","/articles/memento-labs-hacking-team-successor-linked-to-chrome-zero-day-and-dante-spyware","/articles/microsoft-365-admin-center-outage-investigated-as-security-event","/articles/microsoft-enforces-tls-1-2-for-azure-blob-storage","/articles/microsoft-adobe-december-2025-patches-fix-190-vulnerabilities-zero-day","/articles/microsoft-disrupts-vanilla-tempest-ransomware-campaign-by-revoking-certificates","/articles/microsoft-copilot-vulnerable-to-reprompt-attack-for-data-theft","/articles/microsoft-dell-patch-actively-exploited-zero-day-vulnerabilities","/articles/microsoft-links-storm-1175-to-goanywhere-mft-zero-day-cve-2025-10035","/articles/microsoft-issues-emergency-patch-for-actively-exploited-office-zero-day","/articles/microsoft-february-2026-patch-tuesday-fixes-six-actively-exploited-zero-day-flaws","/articles/microsoft-and-law-enforcement-dismantle-redvds-cybercrime-as-a-service-platform","/articles/microsoft-january-2026-patch-tuesday-fixes-114-vulnerabilities","/articles/maverick-new-banking-trojan-spreads-via-whatsapp-in-brazil","/articles/microsoft-excel-flaw-cve-2026-26144-allows-zero-click-data-theft-via-copilot","/articles/microsoft-issues-emergency-hotpatch-for-critical-windows-rras-rce-flaws","/articles/merck-discloses-employee-data-breach-from-third-party-vendor-incident","/articles/micronaut-framework-vulnerable-to-dos-cve-2026-33012-from-unbounded-cache","/articles/microsoft-march-2026-patch-tuesday-fixes-84-flaws-including-two-publicly-disclosed-zero-days","/articles/mentoring-platform-ustrive-exposes-data-of-238000-users-including-minors","/articles/microsoft-october-2025-patch-tuesday-fixes-172-flaws-and-three-zero-days","/articles/medical-tech-giant-stryker-hit-by-destructive-attack-using-microsoft-intune","/articles/microsoft-office-zero-day-cve-2026-21509-actively-exploited","/articles/microsoft-patches-actively-exploited-windows-kernel-flaw","/articles/microsoft-october-2025-patch-tuesday-fixes-four-zero-days","/articles/microsoft-releases-emergency-oob-updates-to-fix-january-patch-tuesday-issues","/articles/microsoft-reveals-whisper-leak-attack-infers-ai-chat-topics-from-encrypted-traffic","/articles/microsoft-patches-actively-exploited-windows-kernel-zero-day-in-november-2025-patch-tuesday","/articles/microsoft-rushes-out-of-band-patch-for-critical-exchange-server-flaw","/articles/microsoft-teams-phishing-campaign-abuses-guest-invitations","/articles/microsoft-october-2025-patch-tuesday-fixes-3-actively-exploited-zero-days","/articles/microsoft-patches-actively-exploited-windows-kernel-zero-day-cve-2025-62215-in-november-patch-tuesday","/articles/microsoft-to-bundle-security-copilot-with-microsoft-365-e5-plans","/articles/microsoft-uncovers-large-scale-tax-themed-phishing-campaigns","/articles/microsoft-patches-actively-exploited-windows-kernel-zero-day-cve-2025-62215","/articles/microsoft-patches-actively-exploited-office-zero-day-cve-2026-21509","/articles/microsoft-uncovers-sesameop-backdoor-using-openai-api-for-c2","/articles/millions-of-anonymous-crime-tips-exposed-in-crimestoppers-hack","/articles/middle-east-conflict-reshapes-global-cyber-threat-landscape","/articles/microsoft-warns-attackers-abusing-teams-for-session-hijacking","/articles/mitre-extends-d3fend-cybersecurity-framework-to-operational-technology-ot","/articles/mitsubishi-electric-discloses-ics-software-credential-flaw","/articles/mortgage-vendor-situsamc-discloses-breach-affecting-major-wall-street-banks","/articles/modular-ds-wordpress-plugin-flaw-under-active-exploitation","/articles/mustang-panda-apt-enhances-stealth-with-signed-kernel-mode-rootkit","/articles/nacogdoches-memorial-hospital-discloses-data-breach-affecting-257000-patients","/articles/nanoremote-backdoor-uses-google-drive-api-for-stealthy-c2","/articles/nato-approves-apple-iphones-ipads-for-restricted-data-handling","/articles/nation-state-financial-cybercrime-converge-industrial-sector-targeted","/articles/model-context-protocol-mcp-servers-emerge-as-new-supply-chain-risk","/articles/namibia-airports-company-data-leaked-on-dark-web-after-ransomware-attack","/articles/navia-benefit-solutions-data-breach-affects-2-7-million","/articles/mysterious-elephant-apt-deploys-custom-tools-against-south-asian-governments","/articles/nation-state-cyber-warfare-threatens-critical-infrastructure","/articles/netmarble-data-breach-exposes-6-million-gaming-members","/articles/new-ai-powered-android-malware-evades-detection-with-human-like-behavior","/articles/netwrix-report-identity-and-data-security-convergence-threats","/articles/moltbook-ai-social-network-breach-exposes-1-5-million-api-keys","/articles/nato-tests-cyber-defenses-in-large-scale-cyber-coalition-exercise","/articles/nefilim-ransomware-operator-artem-stryzhak-pleads-guilty","/articles/navia-data-breach-exposes-personal-and-health-information-of-2-7-million-people","/articles/netrise-launches-provenance-to-vet-open-source-contributor-risk","/articles/mongodb-mongobleed-vulnerability-cve-2025-14847-unauthenticated-data-leak","/articles/multiple-vulnerabilities-disclosed-in-thegem-wordpress-theme-plugin","/articles/multi-stage-phishing-campaign-targets-russia-with-amnesia-rat-and-ransomware","/articles/multi-stage-phishing-campaign-uses-pdfs-and-dropbox-lures","/articles/new-android-malware-bband-siphon-16-0-steals-location-data-from-communication-chip","/articles/network-infrastructure-now-the-top-cyber-risk-forescout-report-warns","/articles/new-britain-connecticut-disrupted-by-ransomware-attack","/articles/new-cross-platform-01flip-ransomware-in-rust-targets-critical-infrastructure","/articles/new-capi-backdoor-malware-targets-russian-auto-and-e-commerce-sectors","/articles/new-apache-tomcat-vulnerabilities-expose-servers-to-rce","/articles/new-gentlemen-ransomware-group-emerges-with-double-extortion-tactics","/articles/new-ai-security-tools-address-ai-generated-code-risks","/articles/new-cephalus-ransomware-exploits-stolen-rdp-credentials","/articles/new-go-based-malware-greenblood-ransomware-and-moonrise-rat-discovered","/articles/new-benzona-ransomware-strain-emerges","/articles/new-clickfix-malware-variant-uses-dns-for-payload-delivery","/articles/new-android-spyware-clayrat-spreads-via-telegram","/articles/new-kyber-ransomware-strain-discovered-with-advanced-encryption","/articles/new-consentfix-phishing-attack-bypasses-mfa-to-hijack-microsoft-accounts","/articles/new-hashjack-attack-bypasses-security-in-ai-enabled-browsers","/articles/new-latent-poisoning-attack-method-creates-hidden-vulnerabilities-in-ai-models","/articles/new-macsync-malware-dropper-evades-macos-gatekeeper","/articles/new-linkpro-linux-rootkit-uses-ebpf-to-hide-from-security-tools","/articles/new-logins-zip-infostealer-service-uses-browser-exploits-for-rapid-theft","/articles/new-migo-malware-disables-endpoint-security-on-linux-systems","/articles/new-nova-stealer-malware-targets-macos-users-for-cryptocurrency-wallets","/articles/new-osiris-ransomware-linked-to-medusa-and-inc-gang-ttps","/articles/new-milkyway-ransomware-strain-emerges-with-aggressive-extortion-tactics","/articles/new-zealand-managemyhealth-patient-portal-data-breach-exposes-126k","/articles/new-us-state-privacy-cybersecurity-laws-effective-january-2026","/articles/new-york-state-inflation-refund-program-exploited-in-phishing-scams","/articles/new-zealand-patient-portal-manage-my-health-hit-by-ransomware","/articles/new-odyssey-stealer-malware-campaign-rapidly-infects-macos-users","/articles/new-white-lock-ransomware-demands-4-bitcoin-ransom","/articles/new-sicarii-ransomware-raas-operation-identified-in-the-wild","/articles/new-pulsar-rat-windows-malware-uses-in-memory-execution","/articles/new-uragan-ransomware-strain-emerges-with-double-extortion-tactics","/articles/nike-sued-in-class-action-over-january-2026-data-breach","/articles/nike-investigates-data-breach-claim-from-worldleaks-extortion-group","/articles/new-zealand-warns-26000-citizens-of-lumma-stealer-malware-infections","/articles/nist-releases-new-quick-start-guides-for-csf-2-0-framework","/articles/nitrogen-ransomware-esxi-encryptor-contains-fatal-coding-error","/articles/nist-releases-draft-cybersecurity-framework-profile-for-artificial-intelligence","/articles/new-russian-malware-and-advanced-starkiller-phishing-tool-emerge","/articles/nist-mitre-launch-20m-ai-centers-for-manufacturing-and-cybersecurity","/articles/nissan-discloses-breach-of-21000-customers-via-compromised-red-hat-server","/articles/nikkei-discloses-slack-breach-exposing-data-of-17000-users","/articles/noction-irp-v4-3-introduces-automated-ddos-detection-and-mitigation","/articles/new-us-national-cyber-strategy-signals-shift-to-offensive-operations","/articles/new-whatsapp-hijacking-method-bypasses-authentication-via-sim-swapping","/articles/nordstrom-email-system-hijacked-to-launch-cryptocurrency-scam","/articles/north-korean-it-worker-fraud-scheme-expands-globally","/articles/north-korean-contagious-interview-campaign-weaponizes-vs-code-projects","/articles/north-korean-bluenoroff-apt-deploys-ai-driven-tools-in-new-campaigns","/articles/north-korean-hackers-target-air-gapped-systems-with-new-malware","/articles/north-korean-lazarus-group-targets-european-drone-companies","/articles/north-koreas-bluenoroff-apt-deploys-new-macos-malware-in-sophisticated-campaigns","/articles/notepad-plus-plus-supply-chain-attack-lotus-blossom-apt","/articles/northgrid-power-releases-post-incident-report-on-blackout-attack","/articles/north-korean-apt-operator-trevor-greer-unmasked-by-opsec-fail","/articles/north-korean-hackers-stole-record-2-billion-in-crypto-in-2025","/articles/norwegian-news-agency-ntb-suffers-major-data-breach","/articles/north-korean-apt-scarcruft-evolves-tactics-in-artemis-campaign","/articles/owncloud-urges-users-to-enable-mfa-amid-credential-stuffing-threats","/articles/palo-alto-networks-details-new-boggy-serpens-apt-campaign-targeting-uae","/articles/osticket-vulnerability-allows-arbitrary-file-reading-via-pdf-export-cve-2026-22200","/articles/north-korean-apt-konni-abuses-google-ads-in-operation-poseidon","/articles/owasp-top-10-for-2025-released-highlighting-supply-chain-and-design-flaws","/articles/notorious-lapsus-hacking-group-resurfaces-with-evolved-tactics","/articles/novel-phishing-attack-abuses-npm-and-unpkg-cdn-for-credential-theft","/articles/nova-ransomware-group-claims-attack-on-kpmg-netherlands","/articles/nsa-releases-foundational-guidelines-for-zero-trust-implementation","/articles/nsfocus-details-mitigation-of-massive-800-gbps-ddos-attack-on-critical-infrastructure","/articles/nsw-health-audit-reveals-widespread-bypass-of-cybersecurity-controls-by-clinicians","/articles/nuventive-announces-soc-2-type-ii-compliance","/articles/panera-bread-2-5-million-settlement-2024-data-breach","/articles/palo-alto-networks-patches-critical-pan-os-denial-of-service-flaw","/articles/panasonic-trials-world-first-cybersecurity-monitoring-for-grid-scale-bess","/articles/nvidia-and-wordpress-plugins-hit-with-ssrf-and-xss-vulnerabilities","/articles/parse-server-dos-vulnerability-cve-2026-32886-allows-remote-crash","/articles/ny-dfs-issues-guidance-on-third-party-cybersecurity-risks","/articles/operation-forumtroll-apt-targets-russian-academics-with-new-phishing-campaign","/articles/nydfs-implements-stricter-cybersecurity-rules-for-financial-firms","/articles/oracle-cloud-infrastructure-misconfiguration-leads-to-data-breach","/articles/opensuse-issues-security-advisory-for-xorg-server-vulnerabilities","/articles/partial-us-government-shutdown-heightens-national-cybersecurity-risks","/articles/panda-restaurant-group-discloses-data-breach-affecting-employees","/articles/operation-endgame-dismantles-rhadamanthys-venomrat-cybercrime-infrastructure","/articles/operation-echidna-dismantles-crimson-market-dark-web-hub","/articles/oracle-issues-emergency-patch-for-critical-rce-flaw-cve-2026-21992","/articles/old-quest-kace-vulnerability-cve-2025-32975-actively-exploited","/articles/oracle-discloses-new-high-severity-flaw-in-e-business-suite","/articles/pawn-storm-apt-deploys-new-prismex-malware-against-defense-supply-chain","/articles/oracle-january-2026-critical-patch-update-fixes-337-flaws-including-cvss-10-bug","/articles/palo-alto-networks-report-ai-driving-massive-expansion-of-cloud-attack-surface","/articles/payload-ransomware-group-claims-breach-of-royal-bahrain-hospital","/articles/pax8-data-leak-exposes-msp-and-customer-data","/articles/oracle-e-business-suite-hit-by-critical-marketing-module-flaws","/articles/palomar-health-medical-group-discloses-data-breach-affecting-patients","/articles/operation-moneymount-iso-phishing-campaign-deploys-phantom-stealer","/articles/palo-alto-networks-uncovers-smishing-and-gift-card-fraud-campaigns","/articles/oracle-january-2026-cpu-fixes-337-flaws-including-critical-remote-exploits","/articles/operation-dupehike-cyber-espionage-campaign-targets-russian-companies","/articles/openai-details-strategy-for-managing-advanced-ai-cybersecurity-risks","/articles/palo-alto-networks-discloses-firewall-denial-of-service-flaw","/articles/osce-releases-new-guide-urging-unified-cyber-physical-security-for-critical-infrastructure","/articles/openclaw-founder-peter-steinberger-joins-openai","/articles/oregon-deq-data-breach-of-4800-people-kept-secret-for-nine-months","/articles/payload-ransomware-group-targets-royal-bahrain-hospital","/articles/ontario-mandates-new-cybersecurity-rules-for-public-sector-entities","/articles/pdfsider-backdoor-uses-dll-side-loading-to-evade-defenses","/articles/pennsylvania-attorney-general-confirms-major-data-breach-by-inc-ransomware","/articles/paypal-discloses-data-breach-from-six-month-long-software-flaw","/articles/open-vsx-marketplace-compromised-to-spread-glassworm-malware","/articles/penn-hacker-claims-theft-of-1-2-million-donor-records-in-major-breach","/articles/pentagon-unveils-new-cyber-force-generation-model","/articles/pentagon-designates-anthropic-supply-chain-risk-over-ai-policy","/articles/perseus-malware-emerges-targeting-dissident-voices","/articles/phishing-campaign-uses-fake-meeting-invites-and-signed-malware","/articles/petco-discloses-data-breach-after-software-misconfiguration-exposes-customer-pii","/articles/philippine-police-on-high-alert-for-anticipated-ddos-attacks","/articles/pig-butchering-scams-evolve-into-major-global-cybercrime-threat","/articles/petlibro-smart-feeder-api-flaw-allows-unauthorized-control","/articles/phantom-entry-zero-day-vulnerability-in-building-management-systems","/articles/phishing-on-microsoft-teams-deploys-a0backdoor-malware","/articles/play-ransomware-group-claims-attack-on-us-based-executive-aviation","/articles/phishing-campaign-uses-vercel-domains-and-telegram-to-deliver-rat","/articles/phishing-campaign-targets-tiktok-for-business-accounts-with-aitm-kits","/articles/police-scotland-fined-by-ico-for-sensitive-data-mishandling","/articles/play-ransomware-targets-manufacturing-firm-deatak","/articles/poland-thwarts-iran-linked-cyberattack-on-national-nuclear-research-center","/articles/predator-spyware-can-invisibly-record-iphone-users","/articles/pro-russian-hackers-launch-ddos-attacks-on-danish-government","/articles/philippines-lawmakers-propose-dedicated-national-cybersecurity-fund","/articles/poland-sees-2-5x-increase-in-cyberattacks-including-unprecedented-energy-sector-assault","/articles/poland-thwarts-cyberattack-on-national-nuclear-research-centre","/articles/pro-russian-hackers-tricked-into-attacking-decoy-water-utility","/articles/polish-loan-platform-supergrosz-suffers-major-data-breach","/articles/popular-npm-package-js-utility-kit-compromised-in-supply-chain-attack","/articles/phishing-campaign-abuses-google-cloud-email-service","/articles/phishing-breach-at-vendor-exposes-innovative-physical-therapy-patient-data","/articles/phishing-campaign-abuses-atlassian-jira-notifications-to-bypass-security","/articles/promptspy-android-malware-uses-google-gemini-ai-for-persistence","/articles/phantom-taurus-chinese-apt-targets-global-geopolitical-intel","/articles/public-sector-ill-prepared-for-ai-powered-cyberattacks-report-finds","/articles/public-exploit-for-critical-ray-rce-vulnerability-threatens-ai-ml-servers","/articles/puerto-rico-water-authority-confirms-cyberattack","/articles/python-cryptography-library-flaw-leaks-private-key-info","/articles/pystorerat-malware-targets-developers-via-fake-github-repos","/articles/qantas-customer-data-leaked-online-after-ransom-deadline-passes","/articles/public-poc-exploit-released-for-critical-outlook-0-click-rce-flaw","/articles/pwn2own-ireland-day-1-hackers-earn-522k-for-34-zero-days","/articles/qilin-and-akira-ransomware-claim-new-high-profile-victims","/articles/protos-labs-launches-freemium-agentic-ai-threat-intelligence-platform","/articles/public-gitlab-repos-expose-over-17000-live-secrets","/articles/prosper-lending-data-breach-affects-17-million","/articles/qilin-ransomware-claims-attack-on-asahi-breweries","/articles/qilin-ransomware-gang-claims-attack-on-italian-manufacturer-cressi","/articles/qilin-ransomware-demands-10m-after-crippling-asahi-breweries","/articles/qilin-ransomware-gang-claims-new-attacks-across-us-france-africa","/articles/qilin-ransomware-group-claims-new-victims","/articles/qilin-ransomware-claims-attack-on-tulsa-international-airport","/articles/qilin-ransomware-claims-attack-on-french-giant-bouygues","/articles/qilin-ransomware-claims-attack-on-japanese-beverage-giant-asahi","/articles/qilin-ransomware-group-claims-b-dynamic-as-new-victim","/articles/qilin-ransomware-hits-italian-logistics-firm-traffic-tech","/articles/qilin-ransomware-korean-leaks-supply-chain-attack-hits-financial-firms","/articles/ransomhub-claims-breach-of-apple-supplier-luxshare-threatens-to-leak-rd-data","/articles/quantumleap-ransomware-cripples-global-logistics-giant-navigistics","/articles/qilin-ransomware-surges-to-become-most-prolific-threat-of-2025","/articles/ransomware-activity-surges-with-28-victims-in-24-hours-lockbit-most-active","/articles/ransomware-attack-hits-spains-port-of-vigo-disrupting-cargo-operations","/articles/ransomware-attacks-skyrocket-50-percent-in-2025-qilin-emerges-as-leader","/articles/ransomware-attack-cripples-asahi-breweries-operations-ahead-of-peak-season","/articles/ransomware-attacks-on-healthcare-and-critical-infrastructure-intensify","/articles/ransomware-attacks-surge-46-percent-construction-manufacturing-hit-hardest","/articles/ransomware-attacks-surged-36-percent-in-q3-2025","/articles/ransomware-attacks-on-critical-industries-surge-34-percent","/articles/ransomware-attacks-peak-on-holidays-and-weekends-study-shows","/articles/ransomware-expands-to-new-regions-and-industries-report-finds","/articles/ransomware-attacks-on-education-sector-slowed-in-2025-says-report","/articles/ransomware-attack-cripples-bridgepay-payment-gateway-causing-nationwide-outages","/articles/ransomware-gang-abuses-legitimate-employee-monitoring-tools-for-stealth","/articles/ransomware-automation-cuts-attack-timelines-to-18-minutes","/articles/qualcomm-releases-january-security-bulletin-for-multiple-products","/articles/ransomhouse-group-hits-fashion-supplier-fulgar-in-supply-chain-attack","/articles/ransomhouse-group-targets-european-retail-operator-neinver","/articles/reports-highlight-growing-threat-of-saas-and-digital-supply-chain-attacks","/articles/red-hat-confirms-data-theft-from-consulting-gitlab-instance","/articles/ransomware-attack-hits-north-dakota-water-treatment-plant","/articles/report-reveals-critical-lack-of-ot-cybersecurity-training","/articles/report-details-north-koreas-use-of-cybercrime-as-statecraft","/articles/researchers-detail-chronostealer-a-new-modular-malware-as-a-service","/articles/raaga-pass-sport-breaches-added-to-have-i-been-pwned-16m-records","/articles/ransomware-tactics-evolve-in-2025-with-focus-on-human-operated-attacks","/articles/researchers-earn-over-1-million-for-hacking-tesla-at-pwn2own-automotive-2026","/articles/respawn-patches-remote-control-exploit-in-apex-legends","/articles/resecurity-claims-hacker-breach-was-a-successful-honeypot-operation","/articles/ransomware-tactics-evolve-amid-declining-profits-2026","/articles/react2shell-critical-rce-flaw-under-mass-exploitation-by-state-actors-and-botnets","/articles/redis-patches-critical-redishell-rce-vulnerability-cve-2025-49844","/articles/researchers-use-font-rendering-trick-to-hide-malicious-commands-from-ai","/articles/retail-sector-faces-surge-in-ai-driven-cyber-threats-report","/articles/rise-in-software-supply-chain-attacks-threatens-global-enterprises","/articles/romanian-energy-producer-oltenia-hit-by-gentlemen-ransomware-on-christmas","/articles/rise-of-autonomous-security-operations-to-counter-ai-threats","/articles/russian-apt-coldriver-deploys-new-malware-after-disclosure","/articles/rsac-2026-preview-ai-security-and-quantum-readiness","/articles/romanian-water-authority-crippled-by-ransomware-attack-affecting-1000-systems","/articles/russian-apt-exploits-zimbra-flaw-in-targeted-phishing-campaign-against-ukraine","/articles/russian-apt-seashell-blizzard-targets-european-critical-infrastructure","/articles/russian-initial-access-broker-sentenced-to-81-months-in-us-prison","/articles/s-rm-report-reveals-fragmenting-ransomware-ecosystem-and-surging-apac-attacks","/articles/scripted-sparrow-bec-group-targets-finance-teams-with-disciplined-phishing-attacks","/articles/samsung-zero-day-flaw-exploited-to-deploy-landfall-android-spyware","/articles/scattered-lapsus-hunters-launches-extortion-site-targeting-salesforce-customers","/articles/russian-state-hackers-target-signal-whatsapp-accounts-in-phishing-campaign","/articles/sans-report-shows-rising-ot-ics-cyber-incidents-driven-by-ransomware","/articles/samsung-settles-with-texas-over-smart-tv-privacy-violations","/articles/sec-charges-seven-firms-in-14m-ai-themed-crypto-investment-scam","/articles/security-vendors-launch-new-products-for-supply-chain-ai-and-malware-analysis","/articles/security-risk-found-in-chinese-made-electric-buses-across-europe-australia","/articles/sedgwick-subsidiary-hit-by-tridentlocker-ransomware","/articles/scattered-lapsus-hunters-claim-supply-chain-breach-via-gainsight-salesforce-integration","/articles/sec-dismisses-lawsuit-against-solarwinds-and-ciso-timothy-brown","/articles/second-critical-rce-flaw-in-n8n-disclosed-cvss-10-0","/articles/search-guard-flx-vulnerability-exposes-protected-documents-dls-bypass","/articles/serbian-gynecology-clinic-patient-data-leaked-after-refusing-ransom","/articles/safepay-ransomware-targets-german-video-surveillance-firm-xortec","/articles/september-healthcare-breaches-decline-but-data-incomplete-due-to-shutdown","/articles/shadow-campaign-espionage-activity-uncovered-china-suspected","/articles/sandworm-deploys-new-dynowiper-malware-in-attack-on-polish-power-grid","/articles/san-antonio-clinic-reports-data-breach-affecting-nearly-20000-patients","/articles/shinyhunters-exploits-salesforce-experience-cloud-misconfigurations-in-mass-data-theft","/articles/shinyhunters-implicated-in-salesforce-data-breach-via-gainsight-app","/articles/signal-threatens-eu-exit-over-chat-control-mass-surveillance-bill","/articles/samsung-rolls-out-february-2026-security-update-with-37-patches","/articles/samsung-releases-november-2025-security-patch-with-45-fixes","/articles/shadow-escape-zero-click-attack-steals-data-from-ai-agents","/articles/shinyhunters-claims-breaches-of-crunchbase-betterment-via-okta-vishing","/articles/shinyhunters-claims-massive-data-breach-at-european-commission","/articles/shinyhunters-claims-massive-data-breach-of-match-group-dating-apps","/articles/silentvoice-phishing-campaign-uses-ai-deepfakes-to-bypass-mfa","/articles/shinyhunters-leaks-12-4-million-cargurus-user-records","/articles/sharepoint-flaws-chained-to-deliver-warlock-ransomware","/articles/shinyhunters-linked-to-voice-phishing-campaign-targeting-okta-and-saas-data","/articles/shinyhunters-claims-massive-petabyte-data-theft-from-telus-digital","/articles/silver-fox-apt-expands-attacks-to-japan-malaysia","/articles/shadowpad-backdoor-deployed-exploiting-windows-server-vulnerability","/articles/sk-telecom-profit-drops-90-percent-after-massive-data-breach","/articles/singapore-telcos-hit-by-coordinated-unc3886-espionage-campaign","/articles/sinobi-ransomware-group-attacks-us-manufacturer-croft-and-indian-tech-firm-changepond","/articles/skeleton-key-campaign-bypasses-malware-defenses-by-abusing-rmm-tools","/articles/simcartel-caas-network-dismantled-in-european-operation","/articles/situsamc-provides-update-on-november-2025-data-breach","/articles/social-engineering-campaign-abuses-whatsapp-for-windows","/articles/slow-email-breach-response-correlates-to-high-ransomware-risk","/articles/smarttube-app-compromised-malware-breached-signing-keys","/articles/socksescort-residential-proxy-botnet-dismantled-in-operation-lightning","/articles/sonicwall-breach-expands-compromising-all-cloud-backup-users","/articles/software-supply-chain-attacks-doubled-in-2025-losses-hit-60-billion","/articles/sonicwall-breach-escalates-100-percent-of-cloud-backups-stolen","/articles/sonicwall-sma-zero-day-cve-2025-40602-actively-exploited-in-chained-attack","/articles/software-supply-chain-attacks-hit-record-high-cyble-report-reveals","/articles/soundcloud-data-breach-exposes-29-million-users","/articles/sonatype-2026-report-open-source-malware-surges-75-percent","/articles/south-korean-conglomerate-kyowon-hit-by-major-ransomware-attack","/articles/starbucks-data-breach-exposes-data-of-nearly-900-employees","/articles/spanish-energy-giant-endesa-suffers-major-data-breach","/articles/spycloud-launches-supply-chain-threat-protection-solution-for-vendor-risk","/articles/starbucks-employee-data-compromised-in-phishing-attack","/articles/stanley-malware-as-a-service-for-malicious-chrome-extensions-emerges","/articles/st-anthony-hospital-discloses-data-breach-affecting-6600-individuals","/articles/state-backed-hackers-escalate-attacks-on-ukraine-and-americas-eset-reports","/articles/statamic-ssrf-flaw-allows-internal-network-access-and-cloud-credential-theft","/articles/spanish-retailer-pccomponentes-denies-breach-cites-credential-stuffing-attack","/articles/state-aligned-hackers-escalate-espionage-in-middle-east-amid-conflict","/articles/state-backed-hackers-weaponize-googles-gemini-ai-in-cyber-operations","/articles/suspected-russian-gru-hacker-arrested-in-thailand","/articles/soundcloud-and-pornhub-disclose-user-data-breaches","/articles/t-mobile-and-capital-one-partner-to-launch-new-credit-card","/articles/swiss-critical-infrastructure-hit-by-325-cyberattacks-in-one-year","/articles/swedish-it-supplier-miljodata-hit-by-breach-exposing-data-of-1-5-million-people","/articles/tag-150-maas-group-operates-modular-loader-rat-campaign","/articles/swedish-it-firm-miljodata-breach-exposes-1-5-million","/articles/software-supply-chain-attacks-hit-record-highs-in-late-2025","/articles/solarwinds-discloses-five-critical-flaws-in-web-help-desk-platform","/articles/stealit-malware-targets-windows-via-nodejs-extensions","/articles/synnovis-confirms-patient-data-stolen-in-qilin-ransomware-attack","/articles/tata-motors-exposes-70tb-of-data-via-misconfigured-aws-keys","/articles/supreme-court-to-hear-case-on-fcc-authority-to-penalize-carriers-for-data-breaches","/articles/substack-discloses-data-breach-exposing-user-contact-information","/articles/swedish-power-grid-operator-svenska-kraftnat-hit-by-everest-ransomware","/articles/supply-chain-breaches-rise-despite-increased-defense-efforts-report-finds","/articles/team-europe-wins-2025-international-cybersecurity-challenge","/articles/tax-season-spurs-wave-of-phishing-campaigns-using-irs-and-w2-lures","/articles/telecom-provider-ribbon-communications-discloses-year-long-nation-state-breach","/articles/tengu-ransomware-claims-attack-on-brazilian-education-provider-unicursos","/articles/the-gentlemen-ransomware-group-profile-and-ttps","/articles/tenex-announces-european-expansion-after-new-funding","/articles/threat-report-ransomware-slowdown-masks-rise-in-nation-state-infrastructure-attacks","/articles/the-gentlemen-ransomware-group-targets-thai-financial-firm-chase-asia","/articles/threat-actors-deploy-rmm-tools-using-windows-screensaver-files","/articles/team-pcp-cascading-supply-chain-attack-compromises-litellm","/articles/telegram-phishing-campaign-re-emerges-abusing-authorization-prompts","/articles/threat-reports-detail-record-breaking-ransomware-activity-in-2025","/articles/transparent-tribe-apt-pivots-to-target-indias-startup-ecosystem","/articles/tokyo-fm-radio-station-hit-by-major-data-breach-3-million-records-claimed","/articles/trivy-scanner-backdoored-with-credential-stealer-in-supply-chain-attack","/articles/trend-micro-apex-central-hit-by-critical-rce-flaw","/articles/transport-for-london-confirms-10m-people-affected-by-2024-data-breach","/articles/trio-tech-international-singapore-subsidiary-hit-by-gunra-ransomware","/articles/triofox-zero-day-exploited-by-unc6485-for-system-level-access","/articles/trizetto-discloses-year-long-data-breach-exposing-patient-phi","/articles/trueconf-zero-day-exploited-in-truechaos-campaign","/articles/turkish-retailer-civil-magazacilik-suffers-data-breach-affecting-4-5-million","/articles/tryhackme-apologizes-for-all-male-expert-list-in-advent-of-cyber-event","/articles/trojanized-7-zip-installer-turns-pcs-into-proxy-nodes","/articles/trump-administration-drafting-new-national-cybersecurity-strategy-for-2026","/articles/ubisoft-rainbow-six-siege-hacked-in-game-economy-disrupted","/articles/two-technology-companies-hit-with-securities-lawsuits-following-data-breaches","/articles/uac-0184-targets-ukrainian-military-via-viber","/articles/two-cvss-10-flaws-disclosed-in-red-lion-industrial-rtus","/articles/trend-micro-details-new-rce-exploit-for-metagpt-cve-2026-0761","/articles/ufp-technologies-discloses-ransomware-attack-and-data-theft","/articles/togo-and-mozambique-sign-cybersecurity-pact-to-bolster-african-digital-defense","/articles/tls-certificate-lifespan-reduced-to-200-days","/articles/uk-employee-data-breaches-hit-seven-year-high-driven-by-hybrid-work","/articles/uk-ncsc-reports-nationally-significant-cyberattacks-more-than-doubled","/articles/uk-ncsc-reports-nationally-significant-cyber-attacks-doubled","/articles/uk-ncsc-issues-heightened-cyber-threat-alert-amid-iran-conflict","/articles/trend-micro-warns-of-severe-rce-flaws-in-apex-one-security-software","/articles/tomiris-apt-upgrades-toolkit-for-espionage-against-diplomatic-targets","/articles/uk-law-criminalizing-ai-generated-intimate-images-takes-effect","/articles/uk-introduces-sweeping-cyber-security-and-resilience-bill","/articles/uk-companies-house-flaw-exposes-data-of-5-million-companies-for-months","/articles/uc-berkeley-announces-regional-summits-for-cyber-civil-defense","/articles/uk-financial-regulators-publish-cyber-attack-recovery-guide","/articles/uk-government-and-ncsc-urge-businesses-to-bolster-cyber-defenses","/articles/ubuntu-privilege-escalation-flaw-cve-2026-3888-in-snapd","/articles/uk-ncsc-warns-of-rising-supply-chain-attacks-as-significant-incidents-double","/articles/uk-proposes-cyber-security-and-resilience-bill-to-regulate-msps","/articles/uk-regulator-fines-capita-14-million-for-preventable-2023-data-breach","/articles/uk-regulator-fines-lastpass-1-2-million-for-2022-data-breach","/articles/uk-to-introduce-cyber-security-resilience-bill-expanding-regulations","/articles/university-of-hawaii-cancer-center-discloses-ransomware-breach-affecting-1-24m","/articles/un-convention-against-cybercrime-signed-in-hanoi-vietnam","/articles/under-armour-faces-class-action-lawsuit-over-november-2025-data-breach","/articles/ukrainian-national-and-conti-ransomware-affiliate-extradited-to-us","/articles/under-armour-investigates-ransomware-attack-and-data-theft-claims","/articles/university-of-mississippi-medical-center-hit-by-crippling-ransomware-attack","/articles/university-of-sydney-discloses-data-breach-affecting-27500","/articles/us-doj-seizes-database-in-28m-bank-account-takeover-scheme","/articles/us-emergency-alert-system-codered-crippled-by-inc-ransom-attack","/articles/unpatched-gogs-git-service-zero-day-cve-2025-8110-actively-exploited","/articles/us-finalizes-rules-to-ban-chinese-and-russian-tech-from-connected-vehicles","/articles/us-congressional-budget-office-breached-by-suspected-foreign-hackers","/articles/us-homeland-security-warns-of-rising-cyber-threats-amid-shutdown","/articles/us-government-offers-10-million-reward-for-blackcat-ransomware-leaders","/articles/us-treasury-announces-new-sanctions-on-cryptocurrency-mixers","/articles/us-indicts-31-more-in-international-atm-jackpotting-scheme","/articles/us-probes-bitmain-over-national-security-risks-operation-red-sunset","/articles/valleyrat-malware-campaign-targets-job-seekers-via-foxit-pdf-reader-lure","/articles/us-treasury-occ-remediates-banknet-portal-vulnerability","/articles/vida-y-salud-health-systems-breach-exposes-data-of-34000-patients","/articles/vault-strategies-breach-data-of-129509-individuals-published-online","/articles/us-congressional-budget-office-confirms-cybersecurity-breach","/articles/vicone-report-highlights-growing-enterprise-wide-risks-in-automotive-cybersecurity","/articles/us-uk-australia-sanction-russian-bulletproof-hosting-network-media-land","/articles/vect-ransomware-group-claims-attack-on-indias-usha-international","/articles/unprecedented-collaboration-found-between-russian-gamaredon-and-north-korean-lazarus-apts","/articles/us-coast-guard-receives-billions-in-funding-for-maritime-cybersecurity-overhaul","/articles/vietnam-airlines-hit-by-massive-data-breach-affecting-7-3m-customers","/articles/voltschemer-attack-manipulates-electric-vehicle-charging-stations","/articles/vmware-privilege-escalation-zero-day-cve-2025-41244-added-to-cisa-kev-catalog","/articles/vmware-patches-critical-rce-flaws-in-vcenter-server-and-esxi","/articles/unprotected-mongodb-database-exposes-4-3-billion-professional-records","/articles/voidlink-new-modular-linux-malware-targets-cloud-environments","/articles/vulnerability-in-mailpit-dev-tool-cve-2026-22689-allows-email-interception","/articles/unsecured-cloud-storage-exposes-healthpath-patient-data","/articles/voicemail-themed-phishing-campaign-deploys-remote-access-tools","/articles/volkswagen-investigates-8base-ransomware-attack-claim","/articles/vmware-aria-rce-flaw-added-to-cisa-kev-catalog","/articles/vishing-campaign-abuses-microsoft-teams-and-quickassist","/articles/volt-typhoon-linked-to-data-breach-at-us-water-utility","/articles/vvs-stealer-malware-uses-pyarmor-to-evade-detection","/articles/washington-post-confirms-breach-in-massive-oracle-software-attack","/articles/warlock-ransomware-breaches-smartertools-via-unpatched-email-server-cve-2026-23760","/articles/washington-post-confirms-victim-of-clop-oracle-supply-chain-attack","/articles/watchguard-warns-of-actively-exploited-critical-firewall-rce-flaw","/articles/wef-report-cyber-fraud-overtakes-ransomware-as-top-threat","/articles/wef-2026-report-warns-of-cyber-inequity-and-ai-driven-threats","/articles/water-gamayun-apt-exploits-windows-msc-eviltwin-vulnerability","/articles/wel-companies-investigated-for-data-breach-affecting-122960-people","/articles/whisperpair-bluetooth-flaw-exposes-millions-of-audio-devices","/articles/westjet-discloses-data-breach-affecting-1-2-million-customers","/articles/white-house-eo-sets-new-deadlines-for-post-quantum-crypto-transition","/articles/widespread-phishing-campaign-impersonates-australia-post","/articles/wynn-resorts-confirms-employee-data-breach-by-shinyhunters","/articles/zdi-discloses-critical-nvidia-aistore-authentication-bypass-flaw","/articles/widespread-phishing-campaign-uses-fake-job-offers-to-steal-credentials","/articles/yara-x-updated-to-warn-analysts-of-flawed-detection-rules","/articles/zapier-pledges-free-ai-education-for-one-million-people","/articles/worldleaks-ransomware-group-targets-city-of-los-angeles","/articles/xwiki-rce-flaw-cve-2025-24893-added-to-cisa-kev-catalog-amid-active-exploitation","/articles/yearn-finance-loses-9m-in-infinite-mint-exploit","/articles/zscaler-patches-critical-privilege-escalation-flaw-in-windows-client-connector","/articles/zoom-and-gitlab-patch-critical-flaws-including-9-9-cvss-vulnerability","/articles/xhunt-cyber-espionage-group-resurfaces-targeting-kuwaiti-organizations","/articles/wordpress-plugin-contest-gallery-vulnerable-to-csv-injection","/articles/zestix-threat-actor-breaches-50-companies-exploiting-lack-of-mfa","/articles/widespread-phishing-campaign-spoofs-tax-agencies-ahead-of-deadlines","/articles/wordpress-security-plugin-anti-malware-security-has-critical-file-read-flaw","/articles/wireshark-vulnerabilities-pose-denial-of-service-risk","/articles/zenithjs-framework-emergency-patch-for-critical-rce-flaw","/articles/zscaler-report-239-malicious-android-apps-on-google-play-downloaded-42-million-times","/publications/daily-threat-publications-2025-10-08","/publications/daily-threat-publications-2025-10-11","/publications/daily-threat-publications-2025-10-17","/publications/daily-threat-publications-2025-10-18","/publications/daily-threat-publications-2025-10-15","/publications/daily-threat-publications-2025-10-19","/publications/daily-threat-publications-2025-10-23","/publications/daily-threat-publications-2025-10-16","/publications/daily-threat-publications-2025-10-13","/publications/daily-threat-publications-2025-10-20","/publications/daily-threat-publications-2025-10-22","/publications/daily-threat-publications-2025-10-21","/publications/daily-threat-publications-2025-10-25","/publications/daily-threat-publications-2025-10-28","/publications/daily-threat-publications-2025-10-10","/publications/daily-threat-publications-2025-10-26","/publications/daily-threat-publications-2025-10-12","/publications/daily-threat-publications-2025-10-27","/publications/daily-threat-publications-2025-10-24","/publications/daily-threat-publications-2025-10-30","/publications/daily-threat-publications-2025-10-06","/publications/daily-threat-publications-2025-10-07","/publications/daily-threat-publications-2025-11-01","/publications/daily-threat-publications-2025-10-14","/publications/daily-threat-publications-2025-11-06","/publications/daily-threat-publications-2025-10-29","/publications/daily-threat-publications-2025-10-31","/publications/daily-threat-publications-2025-11-05","/publications/daily-threat-publications-2025-10-09","/publications/daily-threat-publications-2025-11-09","/publications/daily-threat-publications-2025-11-04","/publications/daily-threat-publications-2025-11-02","/publications/daily-threat-publications-2025-11-10","/publications/daily-threat-publications-2025-11-08","/publications/daily-threat-publications-2025-11-07","/publications/daily-threat-publications-2025-11-13","/publications/daily-threat-publications-2025-11-11","/publications/daily-threat-publications-2025-11-12","/publications/daily-threat-publications-2025-11-18","/publications/daily-threat-publications-2025-11-17","/publications/daily-threat-publications-2025-11-15","/publications/daily-threat-publications-2025-11-21","/publications/daily-threat-publications-2025-11-03","/publications/daily-threat-publications-2025-11-20","/publications/daily-threat-publications-2025-11-14","/publications/daily-threat-publications-2025-11-24","/publications/daily-threat-publications-2025-11-19","/publications/daily-threat-publications-2025-11-16","/publications/daily-threat-publications-2025-11-26","/publications/daily-threat-publications-2025-11-22","/publications/daily-threat-publications-2025-11-28","/publications/daily-threat-publications-2025-12-01","/publications/daily-threat-publications-2025-12-03","/publications/daily-threat-publications-2025-11-30","/publications/daily-threat-publications-2025-12-02","/publications/daily-threat-publications-2025-11-27","/publications/daily-threat-publications-2025-11-25","/publications/daily-threat-publications-2025-11-23","/publications/daily-threat-publications-2025-11-29","/publications/daily-threat-publications-2025-12-04","/publications/daily-threat-publications-2025-12-05","/publications/daily-threat-publications-2025-12-10","/publications/daily-threat-publications-2025-12-11","/publications/daily-threat-publications-2025-12-13","/publications/daily-threat-publications-2025-12-15","/publications/daily-threat-publications-2025-12-14","/publications/daily-threat-publications-2025-12-16","/publications/daily-threat-publications-2025-12-19","/publications/daily-threat-publications-2025-12-23","/publications/daily-threat-publications-2025-12-22","/publications/daily-threat-publications-2025-12-17","/publications/daily-threat-publications-2025-12-18","/publications/daily-threat-publications-2025-12-21","/publications/daily-threat-publications-2025-12-24","/publications/daily-threat-publications-2025-12-20","/publications/daily-threat-publications-2025-12-25","/publications/daily-threat-publications-2025-12-29","/publications/daily-threat-publications-2025-12-27","/publications/daily-threat-publications-2025-12-30","/publications/daily-threat-publications-2025-12-26","/publications/daily-threat-publications-2025-12-28","/publications/daily-threat-publications-2025-12-06","/publications/daily-threat-publications-2025-12-31","/publications/daily-threat-publications-2026-01-01","/publications/daily-threat-publications-2026-01-05","/publications/daily-threat-publications-2025-12-07","/publications/daily-threat-publications-2025-12-09","/publications/daily-threat-publications-2026-01-03","/publications/daily-threat-publications-2026-01-06","/publications/daily-threat-publications-2026-01-07","/publications/daily-threat-publications-2026-01-04","/publications/daily-threat-publications-2025-12-12","/publications/daily-threat-publications-2026-01-02","/publications/daily-threat-publications-2025-12-08","/publications/daily-threat-publications-2026-01-15","/publications/daily-threat-publications-2026-01-12","/publications/daily-threat-publications-2026-01-08","/publications/daily-threat-publications-2026-01-09","/publications/daily-threat-publications-2026-01-16","/publications/daily-threat-publications-2026-01-17","/publications/daily-threat-publications-2026-01-13","/publications/daily-threat-publications-2026-01-10","/publications/daily-threat-publications-2026-01-25","/publications/daily-threat-publications-2026-01-20","/publications/daily-threat-publications-2026-01-14","/publications/daily-threat-publications-2026-01-11","/publications/daily-threat-publications-2026-01-22","/publications/daily-threat-publications-2026-01-23","/publications/daily-threat-publications-2026-01-24","/publications/daily-threat-publications-2026-01-19","/publications/daily-threat-publications-2026-01-27","/publications/daily-threat-publications-2026-01-21","/publications/daily-threat-publications-2026-02-03","/publications/daily-threat-publications-2026-02-08","/publications/daily-threat-publications-2026-02-06","/publications/daily-threat-publications-2026-02-07","/publications/daily-threat-publications-2026-02-11","/publications/daily-threat-publications-2026-01-30","/publications/daily-threat-publications-2026-02-05","/publications/daily-threat-publications-2026-02-10","/publications/daily-threat-publications-2026-02-09","/publications/daily-threat-publications-2026-01-26","/publications/daily-threat-publications-2026-02-14","/publications/daily-threat-publications-2026-02-12","/publications/daily-threat-publications-2026-02-15","/publications/daily-threat-publications-2026-02-17","/publications/daily-threat-publications-2026-02-13","/publications/daily-threat-publications-2026-02-16","/publications/daily-threat-publications-2026-01-28","/publications/daily-threat-publications-2026-02-02","/publications/daily-threat-publications-2026-02-20","/publications/daily-threat-publications-2026-02-04","/publications/daily-threat-publications-2026-02-18","/publications/daily-threat-publications-2026-02-23","/publications/daily-threat-publications-2026-02-19","/publications/daily-threat-publications-2026-02-21","/publications/daily-threat-publications-2026-02-22","/publications/daily-threat-publications-2026-02-01","/publications/daily-threat-publications-2026-02-24","/publications/daily-threat-publications-2026-01-29","/publications/daily-threat-publications-2026-02-25","/publications/daily-threat-publications-2026-03-03","/publications/daily-threat-publications-2026-03-02","/publications/daily-threat-publications-2026-03-04","/publications/daily-threat-publications-2026-03-05","/publications/daily-threat-publications-2026-03-09","/publications/daily-threat-publications-2026-03-13","/publications/daily-threat-publications-2026-02-28","/publications/daily-threat-publications-2026-02-26","/publications/daily-threat-publications-2026-03-01","/publications/daily-threat-publications-2026-02-27","/publications/daily-threat-publications-2026-03-06","/publications/daily-threat-publications-2026-03-12","/publications/daily-threat-publications-2026-03-11","/publications/daily-threat-publications-2026-03-07","/publications/daily-threat-publications-2026-03-17","/publications/daily-threat-publications-2026-03-10","/publications/daily-threat-publications-2026-03-08","/publications/daily-threat-publications-2026-03-20","/publications/daily-threat-publications-2026-03-26","/publications/daily-threat-publications-2026-03-21","/publications/daily-threat-publications-2026-03-23","/publications/daily-threat-publications-2026-03-15","/publications/daily-threat-publications-2026-03-22","/publications/daily-threat-publications-2026-03-25","/publications/daily-threat-publications-2026-03-28","/publications/daily-threat-publications-2026-03-30","/publications/daily-threat-publications-2026-03-29","/publications/daily-threat-publications-2026-04-02","/publications/daily-threat-publications-2026-03-31","/publications/daily-threat-publications-2026-03-18","/publications/daily-threat-publications-2026-03-24","/publications/daily-threat-publications-2026-04-01","/publications/daily-threat-publications-2026-03-16","/publications/daily-threat-publications-2026-03-19","/publications/daily-threat-publications-2026-03-14","/publications/daily-threat-publications-2026-03-27"]}