Friday Squid Blogging: Regulating Squid Fishing in the South Pacific
The South Pacific Regional Fisheries Management...
First VPN Dismantled in Global Takedown Over Use by 25 Ransomware Groups
Authorities in Europe and North America...
Ghostwriter Targets Ukraine Government Entities with Prometheus Phishing Malware
The Belarus-aligned threat actor known as...
A Little SunshineAdam BoileauCISACrowdstrike FalconCybersecurityData BreachesDylan AyreyGitHubJames WilsonLatest WarningsNick AndersenRep. Bennie ThompsonRisky BusinessSen. Maggie HassanThe Coming StormTruffleHogU.S. Cybersecurity & Infrastructure Security Agency
Lawmakers Demand Answers as CISA Tries to Contain Data Leak
Lawmakers in both houses of Congress...
CISA Security Leak
Crazy story: Until this past weekend,...
Megalodon GitHub Attack Targets 5,561 Repos with Malicious CI/CD Workflows
Cybersecurity researchers have disclosed details of...
Making Vulnerable Drivers Exploitable Without Hardware – The BYOVD Perspective
1 Introduction This article provides a...
Kimwolf DDoS Botnet Operator Arrested in Canada Over DDoS-for-Hire Attacks
The U.S. Department of Justice (DoJ)...
APTAPT (Targeted attacks)APT reportsBackdoorCloud AtlasCybersecurityMalware descriptionsMalware TechnologiesMicrosoft WindowsPhishingPowerShellSSHTargeted attacksWindows malware
Cloud Atlas activity in the second half of 2025 and early 2026: new tools and a new payload
In 2025, we observed pervasive SSH...
CISA Adds Exploited Langflow and Trend Micro Apex One Vulnerabilities to KEV
The U.S. Cybersecurity and Infrastructure Security...