Cyber threats and incidents

Critical Ivanti EPMM Vulnerabilities Lead to Fast-Moving Exploitation Attempts

What happened Two critical vulnerabilities in Ivanti Endpoint Manager Mobile (EPMM) are...

Guloader Uses Polymorphic Code and Trusted Cloud Hosting in Recent Campaigns

What happened Researchers at Zscaler have identified new activity involving the Guloader...

Loxam Reports Data Breach Involving Third-Party Software System

What happened Equipment rental company Loxam reported that customer data may have...

TeamPCP Worm Exploits Cloud Infrastructure to Spread and Deploy Malware

What happened Security researchers have uncovered a worm called TeamPCP that abuses...

Bloody Wolf Ransomware Group Targets Uzbekistan, Russia With New Campaign

What happened The ransomware group known as Bloody Wolf has been observed...

Popular

Securing Minnesota’s Campuses: The CISOs to Watch

Higher education security in Minnesota spans everything from a...

The CISOs Keeping Minnesota’s IT and Technology Companies Secure

Minnesota's technology sector does not announce itself the way...

Feuding Ransomware Groups Leak Each Other’s Data, Exposing Operations to Defenders

What happened A feud between two ransomware-as-a-service operations, 0APT and...

Broken VECT 2.0 Ransomware Acts as a Data Wiper for Large Files

What happened Check Point researchers have disclosed that VECT 2.0...

Hackers Are Exploiting a Critical LiteLLM Pre-Auth SQL Injection Flaw

What happened Active exploitation of a critical SQL injection vulnerability...