Posts | Rating | new post |
| Phishing and MFA exploitation: Targeting the keys to the kingdom | 0 user ratings | 2026-04-21 13:11:20 By: milo |
| [Podcast] It's not you, it's your printer: State-sponsored and phishing threats in 2025 | 0 user ratings | 2026-04-21 13:11:19 By: milo |
| Unchecked AI Agents Cause Cybersecurity Incidents at Two Thirds of Firms | 0 user ratings | 2026-04-21 13:06:03 By: milo |
| DLP That Doesn’t Make You Choose: Introducing Menlo AI Adaptive DLP – Blog | Menlo Security | 0 user ratings | 2026-04-21 13:05:49 By: milo |
| Alert: WhatsApp Phishing Campaign Delivers Malware | 0 user ratings | 2026-04-21 13:03:22 By: milo |
| How Internal Scanning works: Q&A with Detectify’s product expert | 0 user ratings | 2026-04-21 12:34:35 By: milo |
| Threat Intel Scraping Without Burning Your Cover or Your Stack | 0 user ratings | 2026-04-21 11:45:23 By: milo |
| No Exploit Needed: How Attackers Walk Through the Front Door via Identity-Based Attacks | 0 user ratings | 2026-04-21 11:40:12 By: milo |
| NGate Campaign Targets Brazil, Trojanizes HandyPay to Steal NFC Data and PINs | 0 user ratings | 2026-04-21 11:40:12 By: milo |
| Google Patches Antigravity IDE Flaw Enabling Prompt Injection Code Execution | 0 user ratings | 2026-04-21 11:40:12 By: milo |
| Ex-parliament worker arrested under anti-hacking laws by counter-terror police - Sky News | 0 user ratings | 2026-04-21 11:19:17 By: milo |
| I found the easiest way to encrypt files on an Android phone - and it's free to do | 0 user ratings | 2026-04-21 11:10:27 By: milo |
| The US NSA is using Anthropic’s Claude Mythos despite supply chain risk | 0 user ratings | 2026-04-21 11:02:09 By: milo |
| Ex-parliamentary employee arrested under anti-hacking law - BBC | 0 user ratings | 2026-04-21 10:47:17 By: milo |
| Ex-parliamentary employee arrested under anti-hacking law - Yahoo | 0 user ratings | 2026-04-21 10:39:14 By: milo |
| Bad Apples: Weaponizing native macOS primitives for movement and execution | 0 user ratings | 2026-04-21 10:31:22 By: milo |
| Former parliamentary employee arrested under anti-hacking law - BBC | 0 user ratings | 2026-04-21 10:23:16 By: milo |
| Mythos can find the vulnerability. It can’t tell you what to do about it. | 0 user ratings | 2026-04-21 10:06:06 By: milo |
| U.S. CISA adds Cisco Catalyst, Kentico Xperience, PaperCut NG MF, Synacor ZCS, Quest KACE SMA, and JetBrains TeamCity flaws to its Known Exploited Vul | 0 user ratings | 2026-04-21 09:57:09 By: milo |
| Vercel Confirms Cyber Incident After Sophisticated Attacker Exploits Third Party Tool | 0 user ratings | 2026-04-21 09:11:04 By: milo |
| Aave could face up to $230 million in losses after Kelp DAO bridge exploit triggers DeFi chaos - CoinDesk | 0 user ratings | 2026-04-21 08:10:18 By: milo |
| Booking.com warns customers of hack that exposed their data Hacking - The Guardian | 0 user ratings | 2026-04-21 08:02:16 By: milo |
| CISA Adds 8 Exploited Flaws to KEV, Sets April-May 2026 Federal Deadlines | 0 user ratings | 2026-04-21 07:03:09 By: milo |
| A look at EU efforts to cut reliance on US tech; study: Amazon, Microsoft, and Google hold 70% of EU cloud and US vendors get 80% of enterprise softw | 0 user ratings | 2026-04-21 06:33:03 By: milo |
| What the ransom note won't say | 0 user ratings | 2026-04-21 05:18:18 By: milo |