Category: Cybersecurity
Fake Starlink and Government Apps Used in Android Malware Campaign Targeting Brazilian Banking and Crypto Users
Siemens SIMATIC Advisory Exposes High-Severity Code Injection Risk Across S7-1500 and ET 200SP Industrial Controllers
Global Botnet Infrastructure Dismantled as U.S. and European Authorities Shut Down SocksEscort Router Proxy Network
White House Orders Federal Crackdown on Transnational Cybercrime and Proposes Victim Restoration Program
TRJ Cybersecurity β ICS Advisory: Apeman Camera Vulnerabilities Expose Remote Control and Surveillance Risks
Phobos Ransomware Operator Pleads Guilty After Global Extortion Campaign Targeted Over 1,000 Organizations
Global Law Enforcement Disrupts Tycoon 2FA Phishing Platform Used to Breach Hospitals, Schools, and Corporate Accounts
CISA Flags Five Actively Exploited Vulnerabilities in Expanding KEV Catalog, Exposing Surveillance Devices, Industrial Systems, and Apple Platforms
Delta Electronics CNCSoft-G2 Industrial Control Software Vulnerability Exposes Critical Manufacturing Systems to Potential Remote Code Execution
Ransomware Breach at University of HawaiΚ»i Cancer Center Exposes Data Linked to Up to 1.2 Million Individuals
ICS Vulnerability Alert: Mitsubishi Electric MELSEC iQ-F EtherNet/IP Modules Exposed to Remote Denial-of-Service Attacks
Critical ICS Vulnerability Found in Labkotec LID-3300IP Monitoring System β Remote System Control Possible
Portwell Engineering Toolkits Vulnerability Raises Privilege Escalation Risks in Industrial Development Environments
TRJ Cybersecurity β Google Disrupts China-Linked Espionage Campaign Targeting Global Telecom and Government Networks
TRJ Cybersecurity β SWITCH EV Platform Vulnerabilities Expose Global Charging Infrastructure to Impersonation and Session Hijack Risk
TRJ Cybersecurity β Pelco Sarix Pro 3 IP Cameras Exposed to Authentication Bypass β Surveillance Integrity at Risk
TRJ Cybersecurity β Frick Quantum HD Controllers Exposed to Pre-Authentication Remote Code Execution β Food & Agriculture Infrastructure at Risk
TRJ Cybersecurity β EV2GO Charging Platform Exposed: Authentication Failures Create High-Risk Entry Points Across Global EV Infrastructure
TRJ Cybersecurity β CloudCharge Platform Vulnerabilities Open Global EV Charging Networks to Session Hijack and Impersonation Risk
Former U.S. Defense Contractor Executive Sentenced to 87 Months for Selling Stolen Cyber Exploits to Russian Broker
ICS ALERT: GARDYN HOME KIT CLOUD & FIRMWARE VULNERABILITIES EXPOSE EDGE DEVICES TO UNAUTHENTICATED TAKEOVER
TRJ CYBERSECURITY β NORTH KOREAN LAZARUS OPERATORS DEPLOY MEDUSA RANSOMWARE IN CROSS-REGIONAL ATTACKS
CISA MOVES TO ELIMINATE END-OF-SUPPORT EDGE DEVICES AS OPENEOX STANDARD TARGETS LIFECYCLE BLIND SPOTS
GLOBAL DATA PROTECTION AUTHORITIES ISSUE JOINT WARNING TO GENERATIVE AI COMPANIES OVER REPLICATION OF REAL PEOPLE
DIGITAL PROXY WORKFORCE: Ukrainian Facilitator Sentenced in North Korea IT Infiltration Scheme Targeting U.S. Companies
INITIAL ACCESS FOR SALE: Romanian Actor Pleads Guilty After Breaching Oregon Emergency Management Network
CHIPCHAIN LOCKDOWN: Ransomware Strike on Advantest Raises Supply-Side Disruption Risk Across Global Semiconductor Testing Infrastructure
THE SILENT GRID: Volt Typhoon Persistence Across U.S. Utilities Signals Long-Term OT Compromise Risk
TEXAS FILES LAWSUIT AGAINST TP-LINK OVER ALLEGED SECURITY MISREPRESENTATIONS AND ROUTER EXPOSURE RISKS
CVE-2026-22769: DELL RECOVERPOINT ZERO-DAY TRIGGERS FEDERAL PATCH ORDER AMID ACTIVE STATE-BACKED EXPLOITATION
North Korean Threat Actor Deploys Deepfake Zoom Ruse and ClickFix Malware in Targeted Crypto Executive Intrusion
Georgia-Based Healthcare Network Reports 626,540 Patient Records Exposed in Qilin Ransomware Intrusion
DIGITAL SQUATTING SURGES 68% AS ATTACKERS WEAPONIZE ROUTINE AND MUSCLE MEMORY TO HARVEST CREDENTIALS
REHEARSING THE BREACH: CHINAβS CYBER RANGE DOCTRINE AND THE QUIET MILITARIZATION OF CRITICAL INFRASTRUCTURE
Apple Pay Real-Time 2FA Harvesting Campaign Exploits Phone-Based Trust to Bypass Account Protections
CISA Orders Federal Agencies to Remove End-of-Life Network Devices Amid Escalating Exploitation Campaigns
CISA Orders Emergency Patch After Exploited SolarWinds Web Help Desk Vulnerability Bypasses Prior Fixes
Russian State-Linked Hackers Exploit Newly Patched Microsoft Office Flaw in Espionage Campaign Across Ukraine and Europe
Notepad++ Update Infrastructure Hijacked in Targeted Supply-Chain Intrusion Linked to State-Aligned Actors
CHINESE CRYPTO LAUNDERING NETWORKS EMERGE AS DOMINANT FORCE IN GLOBAL ILLICIT FINANCE, MOVING $16 BILLION IN 2025
Jordanian Authorities Used Commercial Phone-Extraction Tools Against Gaza War Critics, Forensic Evidence Shows
NSA & Cyber Command Nominee Faces Senate Scrutiny Over Cyber Doctrine, Command Structure, and Deterrence Strategy
