Linkedin
Home
CISO Diaries
AI and security
Cyber threats and incidents
Founders, Analysts & Industry Voices
Identity & Access Management Security
Search
Home
CISO Diaries
AI and security
Cyber threats and incidents
Founders, Analysts & Industry Voices
Identity & Access Management Security
go
Search
Home
CISO Diaries
AI and security
Cyber threats and incidents
Founders, Analysts & Industry Voices
Identity & Access Management Security
go
Search
Cyber threats and incidents
AI and security
Founders, Analysts & Industry Voices
Identity & Access Management Security
Feuding Ransomware Groups Leak Each Other’s Data, Exposing Operations to Defenders
Broken VECT 2.0 Ransomware Acts as a Data Wiper for Large Files
Hackers Are Exploiting a Critical LiteLLM Pre-Auth SQL Injection Flaw
APT36 Escalates Linux‑Focused Attacks with New Espionage Tools
What happened Pakistan‑linked advanced persistent threat group APT36 (also known as Transparent...
North Korean UNC1069 Escalates AI‑Enabled Attacks on Finance and Crypto Firms
What happened North Korea‑linked threat actor UNC1069 has intensified cyberattacks against the...
Socelars Malware Actively Targeting Windows to Steal Business Credentials
What happened Security analysts have identified Socelars, an information-stealing Trojan actively targeting...
Sophisticated Teams-Based Malware Delivery Campaign Hits Niche Industry Sectors
What happened A new phishing campaign leverages Microsoft Teams meeting invites to...
Axios Vulnerability Could Enable Prototype Pollution in JavaScript Projects
What happened A security vulnerability in the widely used Axios JavaScript library...
1
...
77
78
79
...
162
Page 78 of 162
Popular
Securing Minnesota’s Campuses: The CISOs to Watch
April 29, 2026
0
Higher education security in Minnesota spans everything from a...
The CISOs Keeping Minnesota’s IT and Technology Companies Secure
April 29, 2026
0
Minnesota's technology sector does not announce itself the way...
Feuding Ransomware Groups Leak Each Other’s Data, Exposing Operations to Defenders
April 29, 2026
0
What happened A feud between two ransomware-as-a-service operations, 0APT and...
Broken VECT 2.0 Ransomware Acts as a Data Wiper for Large Files
April 29, 2026
0
What happened Check Point researchers have disclosed that VECT 2.0...
Hackers Are Exploiting a Critical LiteLLM Pre-Auth SQL Injection Flaw
April 29, 2026
0
What happened Active exploitation of a critical SQL injection vulnerability...