Cyber threats and incidents

Infostealer Campaigns Expand With Increased Tactics and Targeting

What happened Infostealer malware campaigns are expanding, with threat actors adopting new...

Chrome Vulnerabilities Include Arbitrary Code Execution and Sandbox Escape Flaws

What happened Multiple security vulnerabilities in Google Chrome were disclosed that include...

Multiple Django Vulnerabilities Include Potential Remote Code Execution Flaw

What happened Security advisories for the Django web framework disclosed multiple vulnerabilities,...

Ingress NGINX Vulnerability Could Enable Remote Code Execution in Kubernetes Clusters

What happened A critical vulnerability in the Ingress NGINX controller for Kubernetes...

Hackers Exfiltrating NTDS.dit File to Escalate Domain Access

What happened Security researchers observed threat actors actively exfiltrating the NTDS.dit file...

Popular

Securing Minnesota’s Campuses: The CISOs to Watch

Higher education security in Minnesota spans everything from a...

The CISOs Keeping Minnesota’s IT and Technology Companies Secure

Minnesota's technology sector does not announce itself the way...

Feuding Ransomware Groups Leak Each Other’s Data, Exposing Operations to Defenders

What happened A feud between two ransomware-as-a-service operations, 0APT and...

Broken VECT 2.0 Ransomware Acts as a Data Wiper for Large Files

What happened Check Point researchers have disclosed that VECT 2.0...

Hackers Are Exploiting a Critical LiteLLM Pre-Auth SQL Injection Flaw

What happened Active exploitation of a critical SQL injection vulnerability...