fp-1b
-
Read moreInsight Partners suffered a data breach from a social engineering attack that exposed personal data from HR and finance systems. The breach went undetected for nearly three months before ransomware deployment. Affected users receive identity protection.
-
Read moreThe Pixie Dust attack targets vulnerabilities in Wi-Fi Protected Setup (WPS) to recover router PINs offline, allowing attackers to access wireless networks. Disabling WPS or updating firmware is essential to prevent this exploit.
-
Read moreConor Fitzpatrick, creator of BreachForums, was sentenced to three years in prison for operating a massive cybercriminal forum with over 330,000 users and 14 billion stolen records. DOJ and FBI continue crackdown on dark web crime.
-
Read moreDiscover how AI is becoming the new weapon against financial crime, with Themis’ AI Investigator platform cutting investigation times from weeks to minutes by revealing hidden criminal networks.
-
Read moreRevengeHotels (TA558) escalates cyberattacks with AI-crafted loaders delivering VenomRAT malware, targeting Windows users via phishing. The malware features stealth, persistence, and encrypted communication.
-
Read moreA severe vulnerability in LG WebOS smart TVs enables attackers on the local network to bypass authentication, gain root access, and fully compromise the device. Update your firmware immediately to protect your TV.
-
Read moreTwo medium-severity vulnerabilities in Spring Framework and Spring Security enable authorization bypass via flawed annotation detection on generic superclasses. Upgrade to fixed versions immediately to secure your applications.
-
Read moreMustang Panda, a China-linked threat actor, uses the SnakeDisk USB worm and updated TONESHELL backdoors to target Thailand-based IPs, deploying the Yokai backdoor for remote access. Learn about their evolving malware tactics and focus on Thailand.
-
Read moreIvanti’s September 2025 security bulletin addresses 13 vulnerabilities in Endpoint Manager, Connect Secure, Policy Secure, ZTA Gateways, and Neurons for Secure Access. No known exploitation reported.
-
Read moreA deserialization of untrusted data vulnerability in Dassault Systèmes DELMIA Apriso could allow remote code execution. Learn recommended actions to protect your systems.