Features 18.03.2026
AI Autopsy: Vibe Coding Fuels Global FortiGate Compromises
Why CISOs must ruthlessly enforce the fundamentals
If there’s a topic that floats your boat, click on the options below to explore all related articles.
9 results for "cyber crime"
Features 18.03.2026
Why CISOs must ruthlessly enforce the fundamentals
Weekly Cyber Briefing 13.02.2026
Vulnerability exploits rock government Ivanti users, Microsoft customers and Claude DXT users; the NCSC urges critical infrastructure providers to boost resilience; and LummaStealer infections surge.
Weekly Cyber Briefing 06.02.2026
ShinyHunters use dynamic vishing tech to steal SSO credentials; MongoDB instances continue to be targeted in data extortion attacks; Coinbase reveals insider breach via former contractor; Multiple critical n8n bugs could allow complete remote takeover; AI-powered voice and virtual meeting fraud soars 1000%+ in a year; 0apt unmasked as a scam-as-a-service outfit
Blogs & Opinions 16.01.2026
What happens when curious teens are drawn to the cyber dark side.
Weekly Cyber Briefing 09.12.2025
GhostFrame phishing kit linked to one million stealth attacks;
Features 27.11.2025
The ‘IndonesianFood’ campaign has already flooded npm with over 150,000 spammy packages across multiple accounts
Features 06.11.2025
Could this be the most significant security vendor incident since SolarWinds?
Features 05.11.2025
What happens when threat actors feed security blogs into AI?
Features 30.10.2025
Victims from this data extortion campaign had yet to appear en masse on the Cl0p leak site, but repercussions could still be significant