China-Linked Amaranth-Dragon Exploits WinRAR Flaw in Espionage Campaigns
Threat actors affiliated with China have been attributed to a fresh set of cyber espionage campaigns targeting government and law...
Threat actors affiliated with China have been attributed to a fresh set of cyber espionage campaigns targeting government and law...
Behind the scenes of law enforcement in cyber: what do we know about caught cybercriminals? What brought them in, where...
Cyber incidents in the public sector rarely begin with chaos. More often, they start quietly, with access that appears routine...
Ravie LakshmananJan 28, 2026Critical Infrastructure / Threat Intelligence The "coordinated" cyber attack targeting multiple sites across the Polish power grid...
Image generated by Google Gemini The interim leader of the US’s top civilian cyber defense agency uploaded sensitive government contracting...
Ravie LakshmananJan 27, 2026Threat Intelligence / Cyber Espionage Indian government entities have been targeted in two campaigns undertaken by a...
The Hacker NewsJan 27, 2026Attack Surface Management / Cyber Risk Cybersecurity teams increasingly want to move beyond looking at threats...
Russia-linked Sandworm APT implicated in major cyber attack on Poland’s power grid Pierluigi Paganini January 26, 2026 Russia-linked APT Sandworm...
Lohrmann on Cybersecurity Government security leaders are struggling. Cyber investments are lagging. Resources are being cut. The problem is getting...
Really interesting blog post from Anthropic: In a recent evaluation of AI models’ cyber capabilities, current Claude models can now...
It has just been a few weeks since we reported on the Christmas cyber attack suffered by the European Space...
The UK's National Cyber Security Centre (NCSC) has issued a warning about the threat posed by distributed denial-of-service (DDoS) attacks...