Cyber threats and incidents

VVS Stealer Uses PyArmor Obfuscation to Evade Detection

What happened A new Python-based infostealer, VVS stealer, is using PyArmor obfuscation...

Trust Wallet Theft Linked to Shai-Hulud Supply Chain Attack

What happened The Trust Wallet theft in late December 2025 was linked...

Handala Hackers Targeted Israeli Officials via Telegram

What happened Handala hackers targeted Israeli officials via Telegram, compromising accounts to...

Threat Actors Testing Obfuscated Version of Shai Hulud

What happened Threat actors are testing an obfuscated version of Shai Hulud,...

CISA Warns of WHILL C2 Wheelchairs Vulnerability

What happened CISA warns of WHILL C2 wheelchairs vulnerability that could allow...

Popular

CISO Diaries: Stefano Pasotti on Cybersecurity as Strategy, Not Cost

Cybersecurity is often viewed through the lens of controls,...

Indiana’s CISO Spotlight: Leaders Securing the Hoosier State

Indiana's cybersecurity leadership spans financial services, manufacturing, healthcare, education,...

Securing Colorado’s Government from the Inside: A Public Sector Cybersecurity Feature

Government cybersecurity does not get the same headlines as...

The CISOs Protecting Colorado’s Students, Staff, and Institutional Data

Higher education sits in an uncomfortable position in cybersecurity....

Colorado’s CISO Spotlight: Leaders Securing the State’s Most Complex Environments

Colorado's cybersecurity leadership extends well beyond any single sector....