Category / Security

Security briefings

Cybersecurity briefings on breaches, exploited vulnerabilities, ransomware, incident response, and systemic security failures.

All briefings →

1 min read

Foxconn confirms cyberattack claimed by Nitrogen ransomware gang

Foxconn, the world's largest electronics manufacturer, says some of its North American factories are now working to resume normal operations after a cyberattack.

1 min read

Why Changing Passwords Doesn’t End an Active Directory Breach

Resetting a password doesn't always remove attackers from Active Directory. Specops Software explains how cached credentials and Kerberos tickets can keep attackers authenticated after a reset. Password resets are often the first respons…

  • security

1 min read

JDownloader site hacked to replace installers with Python RAT

The website for the popular JDownloader download manager was compromised earlier this week to distribute malicious Windows and Linux installers, with the Windows payload found deploying a Python-based remote access trojan.

  • security
  • threat-intelligence

1 min read

Insider Betting on Polymarket

Insider trading is rife on Polymarket: Analysis by the Anti-Corruption Data Collective, a non-profit research and advocacy group, found that long-shot bets—­defined as wagers of $2,500 or more at odds of 35 percent or less—­on the platfo…

  • security
  • enforcement

1 min read

Canvas Breach Disrupts Schools & Colleges Nationwide

New security development detected from Krebs on Security. An ongoing data extortion attack targeting the widely-used education technology platform Canvas disrupted classes and coursework at school districts and universities across the Un…

  • security
  • data-security
  • network-edge
  • public-sector

1 min read

Trellix source code breach claimed by RansomHouse hackers

The attack on the Trellix source code repository disclosed last week has been claimed by the RansomHouse threat group, which leaked a small set of images as proof of the intrusion.

  • security
  • vulnerabilities
  • regulation
  • threat-intelligence

1 min read

Hackers abuse Google ads for GoDaddy ManageWP login phishing

A phishing campaign delivered through Google sponsored search results is targeting credentials for ManageWP, GoDaddy's platform for managing fleets of WordPress websites. A phishing campaign delivered through Google sponsored search resu…

  • security
  • threat-intelligence

1 min read

Smart Glasses for the Authorities

ICE is developing its own version of smart glasses, with facial recognition tied to various databases.

  • security
  • data-security

1 min read

Rowhammer Attack Against NVIDIA Chips

A new rowhammer attack gives complete control of NVIDIA CPUs. On Thursday, two research teams, working independently of each other, demonstrated attacks against two cards from Nvidia’s Ampere generation that take GPU rowhammering into ne…

  • security
  • vulnerabilities

1 min read

Why ransomware attacks succeed even when backups exist

Backups don't fail because they're missing, they fail because attackers destroy them first. Acronis explains how ransomware targets backup systems before encryption, leaving no path to recovery. Written by Subramani Raom Senior Manager,…

  • security
  • devops
  • threat-intelligence

1 min read

They don’t hack, they borrow: How fraudsters target credit unions

Fraudsters aren't hacking credit unions, they are exploiting normal business processes. Flare reveals how structured loan fraud methods use stolen identities to pass verification and secure funds. Threat actors across underground forums…

  • security
  • vulnerabilities
  • network-edge
  • threat-intelligence

1 min read

15-year-old detained over French govt agency data breach

French authorities have detained a 15-year-old suspected of selling data stolen in a cyberattack on France Titres (ANTS), the country's agency for issuing and managing administrative documents. French authorities have detained a 15-year-…

  • security
  • data-security
  • public-sector
  • enforcement

1 min read

Anti-DDoS Firm Heaped Attacks on Brazilian ISPs

New security development detected from Krebs on Security. A Brazilian tech firm that specializes in protecting networks from distributed denial-of-service (DDoS) attacks has been enabling a botnet responsible for an extended campaign of…

  • security
  • network-edge
  • threat-intelligence

1 min read

Popular WordPress redirect plugin hid dormant backdoor for years

The Quick Page/Post Redirect plugin, installed on more than 70,000 WordPress sites, had a backdoor added five years ago that allows injecting arbitrary code into users' sites. The Quick Page/Post Redirect plugin, installed on more than 7…

  • security
  • threat-intelligence

1 min read

Broken VECT 2.0 ransomware acts as a data wiper for large files

Researchers are warning that the VECT 2.0 ransomware has a problem in the way it handles encryption nonces that leads to permanently destroying larger files rather than encrypt them.

  • security
  • vulnerabilities
  • public-sector
  • threat-intelligence

1 min read

CISA orders feds to patch Windows flaw exploited as zero-day

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has ordered federal agencies to secure their Windows systems against a vulnerability exploited in zero-day attacks.

  • security
  • data-security
  • vulnerabilities
  • regulation

1 min read

Video service Vimeo confirms Anodot breach exposed user data

Vimeo has disclosed that data belonging to some of its customers and users has been accessed without authorization following the recent breach at the Anodot data anomaly detection company.

  • security
  • data-security
  • threat-intelligence

1 min read

Home security giant ADT data breach affects 5.5 million people

The ShinyHunters extortion group stole the personal information of 5.5 million individuals after breaching the systems of home security giant ADT earlier this month, according to data breach notification service Have I Been Pwned.

  • security
  • data-security
  • threat-intelligence
  • enforcement

1 min read

Robinhood account creation flaw abused to send phishing emails

Online trading platform Robinhood's account creation process was exploited by threat actors to inject phishing messages into legitimate emails, tricking users into believing their accounts had suspicious activity.

  • security
  • vulnerabilities
  • regulation
  • threat-intelligence

1 min read

American utility firm Itron discloses breach of internal IT network

Itron, Inc. has disclosed, via an 8-K filing with the U.S. Securities and Exchange Commission (SEC), a cybersecurity incident in which an unauthorized third party accessed certain internal systems. Utility technology company Itron, Inc.

  • security
  • regulation
  • public-sector
  • enforcement

1 min read

Medieval Encrypted Letter Decoded

Sent by a Spanish diplomat. Apparently people have been working on it since it was rediscovered in 1860.

  • security

1 min read

Medtronic confirms breach after hackers claim 9 million records theft

Medical device giant Medtronic disclosed last week that hackers breached its network and accessed data in "certain corporate IT systems." Medical device giant Medtronic disclosed last week that hackers breached its network and accessed d…

  • security
  • data-security
  • threat-intelligence

1 min read

Threat actor uses Microsoft Teams to deploy new “Snow”

A threat group tracked as UNC6692 uses social engineering to deploy a new, custom malware suite named 'Snow' which includes a browser extension, a tunneler, and a backdoor. A threat group tracked as UNC6692 uses social engineering to dep…

  • security
  • data-security
  • vulnerabilities
  • network-edge

1 min read

Friday Squid Blogging: How Squid Survived Extinction Events

Science news: Scientists have finally cracked a long-standing mystery about squid and cuttlefish evolution by analyzing newly sequenced genomes alongside global datasets. The research reveals that these bizarre, intelligent creatures lik…

  • security

1 min read

Hiding Bluetooth Trackers in Mail

It was used to track a Dutch naval ship: Dutch journalist Just Vervaart, working for regional media network Omroep Gelderland, followed the directions posted on the Dutch government website and mailed a postcard with a hidden tracker ins…

  • security
  • public-sector

1 min read

Apple fixes iOS bug that retained deleted notification data

Apple has released out-of-band security updates for iPhone and iPad devices to fix a Notification Services flaw that could allow notifications marked for deletion to remain stored on the device.

  • security
  • vulnerabilities
  • regulation

1 min read

CISA orders feds to patch BlueHammer flaw exploited as zero-day

CISA has ordered U.S. federal agencies to patch a Microsoft Defender privilege escalation flaw (dubbed BlueHammer) that has been exploited in zero-day attacks. CISA has given U.S.

  • security
  • vulnerabilities
  • regulation
  • public-sector

1 min read

FBI Extracts Deleted Signal Messages from iPhone Notification Database

404 Media reports (alternate site): The FBI was able to forensically extract copies of incoming Signal messages from a defendant’s iPhone, even after the app was deleted, because copies of the content were saved in the device’s push noti…

  • security
  • data-security

1 min read

French govt agency confirms breach as hacker offers to sell data

France Titres, the government agency in France for issuing and managince administrative documents has disclosed a data breach after a threat actor claimed the attack and stealing citizen data.

  • security
  • data-security
  • public-sector
  • threat-intelligence

1 min read

ICE Uses Graphite Spyware

ICE has admitted that it uses spyware from the Israeli company Graphite.

  • security

1 min read

‘Scattered Spider’ Member ‘Tylerb’ Pleads Guilty

New security development detected from Krebs on Security. A 24-year-old British national and senior member of the cybercrime group “Scattered Spider” has pleaded guilty to wire fraud conspiracy and aggravated identity theft.

  • security
  • crypto
  • children
  • threat-intelligence

1 min read

CISA flags new SD-WAN flaw as actively exploited in attacks

​CISA has given U.S. government agencies four days to secure their systems against another Catalyst SD-WAN Manager vulnerability it flagged as actively exploited in attacks. The U.S.

  • security
  • cloud
  • vulnerabilities
  • kev

1 min read

The Gentlemen ransomware now uses SystemBC for bot-powered attacks

A SystemBC proxy malware botnet of more than 1,570 hosts, believed to be corporate victims, has been discovered following an investigation into a Gentlemen ransomware attack carried out by a gang affiliate.

  • security
  • threat-intelligence
  • enforcement

1 min read

Apple account change alerts abused to send phishing emails

Apple account change notifications are being abused to send fake iPhone purchase phishing scams within legitimate emails sent from Apple's servers, increasing legitimacy and potentially allowing them to bypass spam filters.

  • security

1 min read

Is “Satoshi Nakamoto” Really Adam Back?

The New York Times has a long article where the author lays out an impressive array of circumstantial evidence that the inventor of Bitcoin is the cypherpunk Adam Back. I don’t know. The article is convincing, but it’s written to be conv…

  • security
  • regulation

1 min read

Vercel confirms breach as hackers claim to be selling stolen data

Cloud development platform Vercel has disclosed a security incident after threat actors claimed to have breached its systems and are attempting to sell stolen data. Update 4/19/26: Added additional information from Vercel that was disclo…

  • security
  • cloud
  • devops
  • network-edge

1 min read

Critical flaw in Protobuf library enables JavaScript code execution

Proof-of-concept exploit code has been published for a critical remote code execution flaw in protobuf.js, a widely used JavaScript implementation of Google's Protocol Buffers. The tool is highly popular in the Node Package Manager (npm)…

  • security
  • cloud
  • data-security
  • vulnerabilities

1 min read

Friday Squid Blogging: New Giant Squid Video

Pretty fantastic video from Japan of a giant squid eating another squid. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Blog moderation policy.

  • security
  • regulation

1 min read

Operation PowerOFF identifies 75k DDoS users, takes down 53 domains

The latest wave of "Operation PowerOFF," on April 13, 2026, targeted the distributed denial-of-service (DDoS) ecosystem and its users across 21 countries. More than 75,000 individuals using distributed denial-of-service (DDoS) platforms…

  • security
  • network-edge
  • regulation
  • enforcement

1 min read

Recently leaked Windows zero-days now exploited in attacks

Threat actors are exploiting three recently disclosed Windows security vulnerabilities in attacks aimed at gaining SYSTEM or elevated administrator permissions.

  • security
  • cloud
  • vulnerabilities
  • network-edge

1 min read

Defense in Depth, Medieval Style

This article on the walls of Constantinople is fascinating. The system comprised four defensive lines arranged in formidable layers: The brick-lined ditch, divided by bulkheads and often flooded, 15­20 meters wide and up to 7 meters deep…

  • security

1 min read

Patch Tuesday, April 2026 Edition

New security development detected from Krebs on Security. Microsoft today pushed software updates to fix a staggering 167 security vulnerabilities in its Windows operating systems and related software, including a SharePoint Server zero-…

  • security
  • vulnerabilities
  • regulation
  • threat-intelligence

1 min read

Friday Squid Blogging: Squid Overfishing in the South Pacific

Regulation is hard: The South Pacific Regional Fisheries Management Organization (SPRFMO) oversees fishing across roughly 59 million square kilometers (22 million square miles) of the South Pacific high seas, trying to impose order on a…

  • security
  • network-edge
  • regulation

1 min read

New VENOM phishing attacks steal senior executives' Microsoft logins

Threat actors using a previously undocumented phishing-as-a-service (PhaaS) platform called "VENOM" are targeting credentials of C-suite executives across multiple industries. Threat actors using a previously undocumented phishing-as-a-s…

  • security
  • threat-intelligence

1 min read

Eurail says December data breach impacts 300,000 individuals

Eurail B.V., a European travel operator that provides digital passes covering 33 national railways, says attackers stole the personal information of over 300,000 individuals in a December 2025 data breach.

  • security
  • data-security
  • threat-intelligence

1 min read

Russia Hacked Routers to Steal Microsoft Office Tokens

New security development detected from Krebs on Security. Hackers linked to Russia’s military intelligence units are using known flaws in older Internet routers to mass harvest authentication tokens from Microsoft Office users, security…

  • security
  • cloud
  • vulnerabilities
  • network-edge

1 min read

Hong Kong Police Can Force You to Reveal Your Encryption Keys

the Hong Kong police can demand that you reveal the encryption keys protecting your computer, phone, hard drives, etc.—even if you are just transiting the airport. In a security alert dated March 26, the U.S. Consulate General said that,…

  • security
  • regulation
  • enforcement

1 min read

Germany Doxes “UNKN,” Head of RU Ransomware Gangs REvil, GandCrab

New security development detected from Krebs on Security. An elusive hacker who went by the handle “UNKN” and ran the early Russian ransomware groups GandCrab and REvil now has a name and a face.

  • security
  • crypto
  • public-sector
  • threat-intelligence

1 min read

Google Wants to Transition to Post-Quantum Cryptography by 2029

Google says that it will fully transition to post-quantum cryptography by 2029. I think this is a good move, not because I think we will have a useful quantum computer anywhere near that year, but because crypto-agility is always a good…

  • security
  • crypto

1 min read

Traffic violation scams switch to QR codes in new phishing texts

Scammers are sending fake "Notice of Default" traffic violation text messages impersonating state courts across the U.S., pressuring recipients to scan a QR code that leads to a phishing site demanding a $6.99 payment while stealing pers…

  • security
  • threat-intelligence
  • enforcement

1 min read

Axios npm hack used fake Teams error fix to hijack maintainer account

The maintainers of the popular Axios HTTP client have published a detailed post-mortem describing how one of its developers was targeted by a social engineering campaign believed to have been conducted by North Korean threat actors. The…

  • security
  • crypto
  • threat-intelligence
  • espionage

1 min read

Friday Squid Blogging: Jurassic Fish Chokes on Squid

Here’s a fossil of a 150-million year old fish that choked to death on a belemnite rostrum: the hard, internal shell of an extinct, squid-like animal. Original paper. As usual, you can also use this squid post to talk about the security…

  • security
  • regulation

1 min read

Company that Secretly Records and Publishes Zoom Meetings

WebinarTV searches the internet for public Zoom invites, joins the meetings, secretly records them, and publishes (alternate link) the recordings. It doesn’t use the Zoom record feature, so Zoom can’t do anything about it.

  • security
  • data-security

1 min read

ENISA advances the certification of EU Digital Wallets

ENISA is the EU agency dedicated to enhancing cybersecurity in Europe. They offer guidance, tools, and resources to safeguard citizens and businesses from cyber threats. ENISA launches a public consultation on the draft candidate EU Digi…

  • security
  • crypto
  • regulation
  • public-sector

1 min read

US Bans All Foreign-Made Consumer Routers

This is for new routers; you don’t have to throw away your existing ones: The Executive Branch determination noted that foreign-produced routers (1) introduce “a supply chain vulnerability that could disrupt the U.S. economy, critical in…

  • security
  • vulnerabilities
  • network-edge
  • public-sector

1 min read

Is “Hackback” Official US Cybersecurity Strategy?

The 2026 US “Cyber Strategy for America” document is mostly the same thing we’ve seen out of the White House for over a decade, but with a more aggressive tone. But one sentence stood out: “We will unleash the private sector by creating…

  • security
  • public-sector

1 min read

Possible US Government iPhone Hacking Tool Leaked

Wired writes (alternate source): Security researchers at Google on Tuesday released a report describing what they’re calling “Coruna,” a highly sophisticated iPhone hacking toolkit that includes five complete hacking techniques capable o…

  • security
  • vulnerabilities
  • crypto
  • network-edge

1 min read

A Taxonomy of Cognitive Security

Last week, I listened to a fascinating talk by K. Melton on cognitive security, cognitive hacking, and reality pentesting. The slides from the talk are here, but—even better—Menton has a long essay laying out the basic concepts and ideas…

  • security
  • vulnerabilities

1 min read

Inventors of Quantum Cryptography Win Turing Award

Charles Bennett and Gilles Brassard have won the 2026 Turing Award for inventing quantum cryptography. I am incredibly pleased to see them get this recognition. I have always thought the technology to be fantastic, even though I think it…

  • security
  • crypto

1 min read

Apple’s Camera Indicator Lights

A thoughtful review of Apple’s system to alert users that the camera is on. It’s really well-designed, and important in a world where malware could surreptitiously start recording. The reason it’s tempting to think that a dedicated camer…

  • security
  • threat-intelligence

1 min read

‘CanisterWorm’ Springs Wiper Attack Targeting Iran

New security development detected from Krebs on Security. A financially motivated data theft and extortion group is attempting to inject itself into the Iran war, unleashing a worm that spreads through poorly secured cloud services and w…

  • security
  • cloud
  • vulnerabilities
  • devops