Threat actors stories
ShinyHunters claims Woflow breach in supply chain hack
Today
#
data protection
#
ransomware
#
mfa
ShinyHunters claims it hacked merchant data firm Woflow, raising supply chain fears for major brands despite no confirmed breach yet.
Coruna exploit kit exposes risks for outdated iOS users
Yesterday
#
endpoint protection
#
pam
#
mfa
New Coruna exploit kit shows outdated iOS devices face automated, scalable attacks that can turn compromised phones into corporate gateways.
Ransomware attacks surge 50% as industrial firms hit hardest
Yesterday
#
malware
#
data protection
#
ransomware
Global ransomware attacks jump 50% to 7,874 in 2025, with industrial firms bearing the brunt as criminal groups reshuffle their tactics.
Why cybersecurity needs better storytelling; and more women telling It
Yesterday
#
digital transformation
#
advanced persistent threat protection
#
risk & compliance
Cybersecurity's future hinges on clear storytelling - and more women's voices - to turn technical risks into business-critical narratives.
Tycoon 2FA phishing service disrupted in EU crackdown
Yesterday
#
ransomware
#
manufacturing
#
mfa
European authorities and tech firms have disrupted Tycoon 2FA, a major phishing service used to bypass MFA and hijack cloud accounts.
Slow patching leaves SMB endpoints exposed for weeks
Yesterday
#
it automation
#
risk & compliance
#
edr
Acronis finds SMBs patch Microsoft flaws in about eight days, but the slowest endpoints stay exposed to known bugs for over five weeks.
Microsoft warns of AI agent risks in Cyber Pulse brief
3 days ago
#
manufacturing
#
digital transformation
#
physical security
Microsoft's new Cyber Pulse briefing warns ungoverned AI agents and 'double agents' pose rising security and compliance risks for firms.
HP warns of AI-fuelled 'flat-pack' cyberattacks surge
3 days ago
#
malware
#
uc
#
phishing
HP reports a surge in AI-powered “flat-pack” cyberattacks as criminals trade sophistication for speed, low cost and mass customisation.
F5 Labs unveils monthly AI model security leaderboards
5 days ago
#
data protection
#
devops
#
application security
F5 Labs launches monthly AI security leaderboards, ranking popular models on new indices of risk, resilience and cost under live attack.
NCC warns ransomware risk persists despite January dip
Last week
#
ransomware
#
manufacturing
#
digital transformation
Ransomware cases dipped 17% in January, but NCC warns the threat remains high as Qilin targets critical sectors and tactics evolve.
ShinyHunters pivots to subdomain phishing & vishing
Last week
#
saas
#
mfa
#
cloud security
ShinyHunters shifts to subdomain-brand phishing and vishing on mobiles, bypassing domain checks to hijack SSO logins and SaaS sessions.
AI-driven cyber attacks now breach networks in minutes
Last week
#
malware
#
firewalls
#
ransomware
AI-fuelled hackers can now spread across corporate networks in as little as four minutes, outpacing human defenders by hours.
GenAI misuse & ransomware drive surge in cyber attacks
Last week
#
malware
#
edutech
#
uc
Global cyber attacks hit 2,090 a week in January as ransomware surges and risky GenAI use exposes fresh data-leak and intrusion paths.
Hijacked Google Ads push MacSync malware to Mac users
Last week
#
storage
#
phishing
#
email security
Hijacked Google Ads accounts are serving bogus installers that trick Mac users into running MacSync stealer via fake Evernote guides.
CISOs cautious as agentic AI adoption in security lags
Last week
#
firewalls
#
data protection
#
manufacturing
CISOs slow-roll agentic AI in defence, even as they brace for more advanced, AI-boosted attacks and rising personal liability risks.
Surveillance, AI and the security gaps behind the camera
Last month
#
data protection
#
surveillance
#
biometrics
As facial analytics quietly spread through public spaces, Canadians face urgent questions over privacy, consent and digital surveillance.
Android PromptSpy malware harnesses Gemini for stealth
Last month
#
endpoint protection
#
mdm
#
phishing
PromptSpy Android malware taps Google's Gemini AI to navigate screens, lock itself in recent apps and thwart users' attempts to remove it.
EY maps hyper-velocity AI priorities for tech during 2026
Last month
#
devops
#
digital transformation
#
phishing
EY urges tech leaders to pursue AI-fuelled deals, agentic systems and sovereignty-by-design as 2026 competition and security pressures grow.
OT cyber threats shift from spying to disruption in 2025
Last month
#
ransomware
#
iot security
#
advanced persistent threat protection
Cyber attacks on industrial systems in 2025 shifted from quiet spying to coordinated operations aiming to disrupt critical infrastructure.
Data-only extortion surges as remote access abused
Last month
#
data protection
#
dr
#
vpns
Data-only extortion soars 11-fold as attackers 'log in instead of break in', abusing remote access tools for faster, stealthier raids.