Files on a central cloud server used by the ransomware group highlight a systematic, aggressive attack on network backups as a key TTP.
Flux RSS
— Sources secondairesThe ransomware gang, known for double-extortion attacks, had access to a critical Cisco firewall vulnerability weeks before it was publicly disclosed.
Sysdig details how threat actors exploited a critical CVE in Langflow in less than a day
The National Crime Agency’s director general warns that technology is rapidly reshaping crime
Situation as at 31 December 2025
(first publication: 30 October 2024)
Situation as at 31 December 2025
Situation as at 31 December 2025
RSAC Conference Preview: MCP introduces security risks into LLM environments that are architectural and not easily fixable, researcher says.
Major industry leaders agree to share information and collaborate to boost defenses in the wake of distressing online scams.
The cloud security startup's platform translates and enforces security policies across AWS, Azure, Google Cloud, and Oracle using provider-native controls.
Major providers are testing a quantum-safe version of HTTPS that shrinks certificates to one-tenth their previous size, decreasing latency and adding transparency.
Hastalamuerte leaks The Gentlemen RaaS ops: FortiGate exploits, BYOVD evasion, Qilin split tactics
Mobile banking malware targets over 1200 financial apps globally, shifting fraud to user devices
The UK’s financial regulator has issued new rules to make incident and third-party reporting clearer
Notorious ransomware group Interlock has been exploiting a Cisco zero-day bug since January, AWS says