Active threats, vulnerabilities, and cyber incidents worldwide.
Real-time cybersecurity intelligence with full source verification.
Ilya Angelov sentenced for managing phishing botnet that launched BitPaymer ransomware against 72 US firms.
Armenian national Hambardzum Minasyan was extradited to face federal charges for allegedly administering one of the world's most prevalent infostealer operations.
Critical authentication bypass vulnerability CVE-2026-35616 in FortiClient EMS has been exploited in the wild over recent weeks.
Florida's attorney general has launched an investigation into OpenAI over the alleged role of ChatGPT in the murders of two University of South Florida students.
Mizuho forecasts CrowdStrike stock gains after Anthropic's Project Glasswing highlights AI-driven cybersecurity risks.
The urgent update addresses a flaw that allowed data extraction by law enforcement, surprising users with its sudden rollout.
A new Breaking Defense eBook examines the Pentagon's evolving satellite strategy, emphasizing data networks, missile tracking, and cyber resilience.
The Pentagon is pursuing flying directed energy weapons to counter aerial threats to American airspace.
A new report highlights record economic losses from cybercrime, with state-sponsored hackers increasingly targeting American financial systems.
The Pentagon must shift from proprietary products to multi-sourced, competitive programs to enhance supply chain resilience, according to a new analysis.
A US Navy admiral told the Senate that INDOPACOM is running a Bitcoin node to test the protocol for cybersecurity and power projection.
The company is demonstrating its GPT-5.4-Cyber model to federal agencies and allied nations.
The exchange's quantum advisory board says blockchain is safe for now but calls for industry-wide upgrades to quantum-resistant cryptography.
The nation's top cybersecurity agency is excluded from testing a powerful AI model designed to find software vulnerabilities.
Ukrainian forces have successfully integrated a sea-based unmanned surface vessel with an air-launched interceptor drone to destroy a Russian kamikaze drone.
The blockchain firm has outlined a plan to transition its network to quantum-resistant cryptography by 2028.
The Ketman Project, funded by the Ethereum Foundation, has exposed a network of DPRK-linked IT workers allegedly embedded in dozens of cryptocurrency ventures.
A major exploit on a cross-chain bridge has triggered a massive withdrawal from the decentralized lending protocol.
A single victim lost over $280 million in a targeted wallet compromise, according to blockchain investigator ZachXBT.
A single victim suffered a massive loss across Ethereum and Arbitrum protocols in a targeted attack flagged by blockchain investigator ZachXBT.
The AI firm's leadership engaged with the Biden administration as it launched its latest Claude model.
The identity verification company, formerly Worldcoin, announces integrations with Zoom, Shopify, and others as AI agents proliferate.
A rebellion by 20 Republicans derailed a long-term renewal of surveillance powers, forcing a two-week patch.
The Trump administration is in talks to deploy Anthropic's powerful Mythos AI for national security despite the company's ongoing legal battle with the Pentagon.
A new AI model from Anthropic reportedly possesses capabilities that could autonomously exploit critical software vulnerabilities, fundamentally altering the cyber threat landscape.
A global Starlink network failure last August halted U.S. Navy unmanned surface vessel operations during testing, highlighting the military's critical reliance on commercial satellite services.
The use of a rare frog toxin in the Russian opposition leader's death highlights the erosion of international norms against state-sponsored poisonings.
A non-profit technical report examines the timeline and potential impact of quantum computers breaking Bitcoin's cryptographic security.
The crypto exchange is reportedly in talks to integrate Anthropic's Mythos AI model as part of its Project Glasswing security overhaul.
OpenAI is broadening availability of advanced cybersecurity AI tools while implementing identity checks to prevent misuse.
The Air Force is testing a new capability to remotely reprogram electronic warfare pods in flight via satellite to counter emerging threats.
Experts warn that low-cost, viral AI content is reshaping propaganda efforts during the Iran war, making it harder to distinguish from authentic material.
An analysis suggests XRP's cryptographic structure may offer greater resistance to future quantum computing attacks compared to Bitcoin.
A malicious application posing as Ledger's crypto wallet drained a musician's funds after he entered his recovery phrase.
An unintentional leak of internal Claude code components has reignited discussion about the credibility of neuro-symbolic AI approaches.
Cybercrime targeting the housing sector accounted for over 12,000 complaints last year.
The Iranian government deliberately shut down internet traffic by 98% after military strikes targeted its leadership and capabilities.
Federal prosecutors are escalating efforts to identify an anonymous user who posted critical comments about Immigration and Customs Enforcement.
Military analysts describe a dispersed battlefield where Russian infiltration tactics are failing to produce meaningful gains.
British intelligence tracked a Russian submarine deployment involving an Akula-class and two surveillance vessels, raising concerns over critical infrastructure.
OpenAI is preparing a staggered rollout of a new model with advanced cybersecurity capabilities, limiting access to selected companies amid safety concerns.
Investment bank highlights two cybersecurity firms as key beneficiaries of Anthropic's new AI security technology.
The company is limiting access to its latest model after it demonstrated ability to find tens of thousands of security vulnerabilities and create exploits.
Attackers are exploiting CVE-2025-59528, a maximum-severity remote code execution flaw in the open-source LLM platform Flowise.
Industry conference highlights how artificial intelligence is accelerating changes in cybersecurity operations and defense strategies.
Trump administration seeks to reduce CISA funding while refocusing agency on core mission of protecting federal agencies and critical infrastructure.
Federal Criminal Police Office unmasks key figures from defunct ransomware operation that targeted 130 German organizations.
A structural defense proposed by a DeFiLlama developer would have applied to just one of the industry's largest exploits, highlighting the complexity of crypto security challenges.
Attackers are leveraging CVE-2025-55182 in vulnerable Next.js applications to steal credentials at scale.
Cybersecurity researchers discovered malicious packages that exploit databases and deploy persistent implants on infected systems.
Popular HTTP client library compromised after fake Microsoft Teams fix led to maintainer account hijacking.
OAuth 2.0 Device Authorization Grant flow increasingly exploited to hijack user accounts through sophisticated phishing campaigns.
Microsoft's LinkedIn uses hidden JavaScript to scan visitor browsers for installed extensions and collect device information, raising privacy concerns.
Threat actors are using HTTP cookies to control PHP-based web shells on Linux systems, enabling remote code execution while evading detection.
Apple has extended security updates to more iPhones running iOS 18 to protect against the actively exploited DarkSword exploit kit used by state-sponsored hackers and spyware vendors.
Cisco released updates for a critical vulnerability in its Integrated Management Controller that could allow remote attackers to bypass authentication and gain elevated system access.
A threat actor infiltrated the Texas hospital's internal network in January, stealing personal and health information from a quarter million individuals.
Financially motivated threat actors have been using fraudulent installers since November 2023 to distribute malware and conduct cost-per-action fraud schemes.
Cybercriminals are using a new malicious toolkit to exploit Microsoft's device authentication system for account takeovers and business email compromise attacks.
Cybercriminals are promoting CrystalRAT on Telegram, combining traditional RAT capabilities with stealer functions and prankware elements.
Meta's messaging platform alerts users about malicious app designed by Italy's SIO spyware company, with most victims located in Italy.
CVE-2026-3502 allows attackers to distribute malicious software updates through compromised video conferencing systems.
Ukrainian cybersecurity agency warns of threat actors using its identity to distribute remote access tools via email.
Hackers are actively exploiting a critical severity vulnerability in Citrix NetScaler ADC and Gateway appliances to obtain sensitive data.
New campaign uses WhatsApp messages to distribute malicious Visual Basic Script files that establish persistence and enable remote access on Windows systems.
Brazilian cybercrime group deploys multi-pronged phishing campaign using Horabot malware to deliver banking trojans to Spanish-speaking organizations.
Binance co-founder Changpeng Zhao addresses quantum computing fears, says crypto can upgrade to quantum-resistant cryptography.
Suspected North Korean hackers briefly turned the popular Axios JavaScript package into malware, affecting roughly 3% of scanned environments before removal.
Iranian APTs blur lines between state-sponsored and cybercriminal activities with new ransomware campaigns.
Iran-linked groups leaked FBI Director Kash Patel's emails and allegedly threatened Lockheed Martin workers with personal details about families.
The cybersecurity agency mandates urgent patching of Citrix NetScaler appliances against a vulnerability currently being exploited in the wild.
Security researchers reveal a blind spot in Google Cloud's Vertex AI platform that could allow attackers to weaponize AI agents for unauthorized data access.
An integer underflow flaw in StrongSwan VPN software enables unauthenticated attackers to remotely crash VPN connections.
This week saw long-running cyber operations reaching courtrooms while old attack methods resurface in new contexts.
Previously undocumented malware loader leverages ClickFix tactics and WMI persistence to evade detection while stealing passwords and session data.
Handala hackers linked to Iran breached FBI Director Kash Patel's personal email and published photos and documents.
Proofpoint researchers discovered Russian state-sponsored actors targeting iOS devices with recently disclosed exploit tools.
Handala Hack Team says it stole personal information from FBI Director in apparent retaliation for domain seizures.
New Python-based info-stealer uses fake software update prompts to harvest credentials and system data from Mac users.
Cybercriminals are using fake CAPTCHA pages disguised as Cloudflare security checks to deliver information-stealing malware to Mac systems.
CVE-2025-53521 enables remote code execution with a CVSS score of 9.3, prompting emergency catalog inclusion.
European lawmakers voted against continuing current child safety scanning requirements despite support from law enforcement and tech companies.
OpenAI will reward security researchers who identify design or implementation issues that could lead to material harm in its AI systems.
Tech giant plans complete post-quantum cryptography implementation within five years as quantum computing threats loom.
Security flaws in TP-Link routers could allow attackers to bypass authentication, execute commands, and decrypt configuration files.
Threat actors are using adversary-in-the-middle phishing pages to hijack TikTok for Business accounts for malvertising and malware distribution.
A now-patched vulnerability in Open VSX's scanning pipeline allowed malicious Visual Studio Code extensions to pass security checks and reach the registry.
The hacktivist group has escalated cyber operations against Russian targets since January 2025, deploying newly developed ransomware tools.
Many organizations deploy security tools but lack methods to verify if their defenses would actually stop genuine threats.
Elite nation-state hacking tools now accessible to wider threat actors after code repository leak.
Britain targets Chinese-language crypto marketplace selling stolen data and equipment to Southeast Asian fraud operations.
Security professionals note a concerning trend toward sustained, low-profile attacks exploiting familiar vulnerabilities.
Active campaign exploiting OAuth device code flow hits organizations across five countries since February 2026.
Security experts draw parallels between 1960s art forger Elmyr de Hory's methods and modern hacking techniques to improve defensive strategies.
Security researchers discovered a vulnerability in Anthropic's Claude browser extension that enabled silent prompt injection without user interaction.
Financial services company reports hackers stole names, Social Security numbers, and driver's license numbers.
Lawsuit alleges weak security controls and delayed notification after hack exposed employee data.
Attacks exploiting the PolyShell vulnerability are actively targeting 56% of vulnerable Magento Open Source and Adobe Commerce version 2 installations.