Google Disrupts Extensive Residential Proxy Networks
Google has taken coordinated action against the massive IPIDEA residential proxy network, enhancing customer protections and disrupting cybercrime operations
Aggregating 5168 articles from trusted cybersecurity sources
Google has taken coordinated action against the massive IPIDEA residential proxy network, enhancing customer protections and disrupting cybercrime operations
The FBI outlines ten actions which organizations can take to defend networks against cybercriminal and nation-state threats
The French data protection regulator said that France Travail’s response to a 2024 data breach violated GDPR
CISA urges action against insider threats with publication of a new infographic offering strategies to manage risks
The dark web forum administrator confirmed the takedown and said they had “no plans to rebuild”
Ransomware victims surged in Q4 2025 despite fewer active extortion groups, with data leaks rising 50%, ReliaQuest researchers report
Non-profit ITRC says the number of data breaches increased 5% annually to reach a record total in 2025
Software signatures carry an invisible expiration date. The container image or firmware you sign today might be deployed for 20 years, but the cryptographic ...
Cybersecurity is now the fifth fastest-growing occupation in the UK, says Socura
Despite the seemingly widespread adoption of AI for security operations, security leaders primarily use it for “relatively basic use cases,” said a Sumo Logi...
A recent update has fixed 12 vulnerabilities in OpenSSL, some existing in the codebase for years
Two critical security flaws in n8n have exposed sandboxing vulnerabilities, enabling remote code execution for attackers
Trellix disclosed a security breach affecting part of its source code repository, however, the company says there’s no sign of code misuse. Trellix revealed ...
Cybersecurity company Trellix has announced that it suffered a breach that enabled unauthorized access to a "portion" of its source code. It said it "recentl...
Cybersecurity researcher Jeremiah Fowler discovered the data, which included intimate chat logs from apps like WhatsApp, Facebook, TikTok, and Instagram.
French authorities have detained a 15-year-old suspected of selling data stolen in a cyberattack on France Titres (ANTS), the country's agency for issuing an...
Illicit AI-assisted commit-linked npm dependency compromises crypto wallets North Korean state-backed threat group Famous Chollima, also known as APT37 and R...
BleepingComputer initially published a story about a new data breach at Instructure. Shortly after publication, we determined that the information was incorr...
Other noteworthy stories that might have slipped under the radar: OFAC hits Iranian central bank crypto reserves, ADT data leak, CISA guidance for zero trust...
These financially-motivated attackers, closely aligned with Scattered Spider, use voice-phishing and social engineering to breach victims' identity platforms...
Xorcat claimed to exploit several vulnerabilities, including undocumented API endpoints, a pagination bypass on the CLOB trading system by altering code to r...
A threat actor claimed on a dark web forum to have obtained and leaked a complete database of AFC players and coaches, including data from Al Nassr FC.
Cybernews reports that European ultra low-cost airline Ryanair had its flight compensation data proliferating across underground cybercrime forums after a th...
The minor was taken into police custody on April 25 on suspicion of involvement in a data breach affecting the National Agency for Secure Documents (ANTS), w...