Cyber threats and incidents

Windows Error Reporting Service Vulnerability Lets Local Users Escalate Privileges

What happened A security vulnerability in the Windows Error Reporting Service was...

VoidLink Linux C2 Highlights Use of LLM-Generated Malware Components

What happened Security researchers have identified a Linux-focused command-and-control (C2) framework named...

React2Shell Vulnerability Abused to Deliver AI-Generated Malware

What happened A critical vulnerability in the React2Shell extension for React Native...

Conduent Data Breach Balloons, Affecting Millions More Americans

What happened A ransomware attack on government technology contractor Conduent has expanded...

Leaked Technical Documents Show China Rehearsing Cyberattacks on Neighbors’ Critical Infrastructure

What happened Leaked internal technical documents indicate that China has been rehearsing...

Popular

Securing Minnesota’s Campuses: The CISOs to Watch

Higher education security in Minnesota spans everything from a...

The CISOs Keeping Minnesota’s IT and Technology Companies Secure

Minnesota's technology sector does not announce itself the way...

Feuding Ransomware Groups Leak Each Other’s Data, Exposing Operations to Defenders

What happened A feud between two ransomware-as-a-service operations, 0APT and...

Broken VECT 2.0 Ransomware Acts as a Data Wiper for Large Files

What happened Check Point researchers have disclosed that VECT 2.0...

Hackers Are Exploiting a Critical LiteLLM Pre-Auth SQL Injection Flaw

What happened Active exploitation of a critical SQL injection vulnerability...