Weekly Cyber Briefing 01.05.2026
Weekly Cyber Update: 1 May 2026
Zimbra servers, SAP npm packages and cPanel/WHM systems under attack; utility tech firm Itron reports a security breach
If there’s a topic that floats your boat, click on the options below to explore all related articles.
13 results for "cyber crime"
Weekly Cyber Briefing 01.05.2026
Zimbra servers, SAP npm packages and cPanel/WHM systems under attack; utility tech firm Itron reports a security breach
Weekly Cyber Briefing 24.04.2026
UK health data leaks to China; three Windows zero-days are exploited in the wild; researchers warn of “silent subject” phishing campaign; Chinese hackers use proxy networks; and AI models get better at generating exploits
Features 14.04.2026
The era of permissive BYOD policies may be coming to an end
Features 07.04.2026
What happens when threat actors hijack critical security controls?
Features 18.03.2026
Why CISOs must ruthlessly enforce the fundamentals
Weekly Cyber Briefing 13.02.2026
Vulnerability exploits rock government Ivanti users, Microsoft customers and Claude DXT users; the NCSC urges critical infrastructure providers to boost resilience; and LummaStealer infections surge.
Weekly Cyber Briefing 06.02.2026
ShinyHunters use dynamic vishing tech to steal SSO credentials; MongoDB instances continue to be targeted in data extortion attacks; Coinbase reveals insider breach via former contractor; Multiple critical n8n bugs could allow complete remote takeover; AI-powered voice and virtual meeting fraud soars 1000%+ in a year; 0apt unmasked as a scam-as-a-service outfit
Blogs & Opinions 16.01.2026
What happens when curious teens are drawn to the cyber dark side.
Weekly Cyber Briefing 09.12.2025
GhostFrame phishing kit linked to one million stealth attacks;
Features 27.11.2025
The ‘IndonesianFood’ campaign has already flooded npm with over 150,000 spammy packages across multiple accounts
Features 06.11.2025
Could this be the most significant security vendor incident since SolarWinds?
Features 05.11.2025
What happens when threat actors feed security blogs into AI?
Features 30.10.2025
Victims from this data extortion campaign had yet to appear en masse on the Cl0p leak site, but repercussions could still be significant