Credentials theftCredit CardscrimewareCybersecurityDarknetData theftDigital forensicsFinancial malwareFinancial threatsGrandoreiroInfostealersMastercardMaverickMobile MalwareMoney theftPaypalPhishingPhishing websitesPublicationsScamSpam and phishingTrojan BankerVISAWeb threatsWindows malware
Financial cyberthreats in 2025 and the outlook for 2026
In 2025, the financial cyberthreat landscape...
Iran-Linked Hackers Disrupt U.S. Critical Infrastructure by Targeting Internet-Exposed PLCs
Iran-affiliated cyber actors are targeting internet-facing...
As breakout time accelerates, prevention-first cybersecurity takes center stage
Threat actors are using AI to...
ISC Stormcast For Wednesday, April 8th, 2026 https://isc.sans.edu/podcastdetail/9884, (Wed, Apr 8th)
(c) SANS Internet Storm Center. https://isc.sans.edu...
C3 Launches C3 Code for Businesses Seeking Domain Expertise
The vendor's new application is for enterprises seeking an agentic coding platform with expertise in industries such as manufacturing and energy.
A Little Bit Pivoting: What Web Shells are Attackers Looking for?, (Tue, Apr 7th)
Webshells remain a popular method for attackers...
Russian State-Linked APT28 Exploits SOHO Routers in Global DNS Hijacking Campaign
The Russia-linked threat actor known as APT28...
Cybersecurity in the Age of Instant Software
AI is rapidly changing how software...
A Little SunshineAPT 28Black Lotus LabsCybersecurityDanny AdamitisFancy BearForest BlizzardInternet of Things (IoT)Latest WarningsLumenMicrosoft OfficeMikroTikNational Cyber Security CentreNe'er-Do-Well NewsRyan EnglishThe Coming StormTP-Link
Russia Hacked Routers to Steal Microsoft Office Tokens
Hackers linked to Russia’s military intelligence...
Docker CVE-2026-34040 Lets Attackers Bypass Authorization and Gain Host Access
A high-severity security vulnerability has been...