Attackers can execute arbitrary code without authentication if Oracle's Identity or Web Services Managers are exposed to the Web.
Flux RSS
— Sources secondairesFiles on a central cloud server used by the ransomware group highlight a systematic, aggressive attack on network backups as a key TTP.
Pedestrians crossing a street in Denver, Colorado, got rather more than they bargained for last weekend, when the audio signals at two crosswalks began broadcasting a political message alongside their usual walking instructions. Read more in my article on the Hot for Security blog.
The ransomware gang, known for double-extortion attacks, had access to a critical Cisco firewall vulnerability weeks before it was publicly disclosed.
Sysdig details how threat actors exploited a critical CVE in Langflow in less than a day
A ransomware gang that claims to be a group of "investigative journalists"? Meet LeakNet - the group using fake CAPTCHA pages to trick employees into hacking themselves. Read more in my article on the Fortra blog.
The National Crime Agency’s director general warns that technology is rapidly reshaping crime
Situation as at 31 December 2025
(first publication: 30 October 2024)
Situation as at 31 December 2025
Situation as at 31 December 2025
RSAC Conference Preview: MCP introduces security risks into LLM environments that are architectural and not easily fixable, researcher says.
Major industry leaders agree to share information and collaborate to boost defenses in the wake of distressing online scams.
The cloud security startup's platform translates and enforces security policies across AWS, Azure, Google Cloud, and Oracle using provider-native controls.
Major providers are testing a quantum-safe version of HTTPS that shrinks certificates to one-tenth their previous size, decreasing latency and adding transparency.
Hastalamuerte leaks The Gentlemen RaaS ops: FortiGate exploits, BYOVD evasion, Qilin split tactics
Mobile banking malware targets over 1200 financial apps globally, shifting fraud to user devices