Categories
CNET
- 'Hey Meta': New AI Features Come to Meta's Ray-Bans 1 hour 33 min old , CNET Feed
- Today's Wordle Hints, Answer and Help for April 24, #1405 1 hour 42 min old , CNET Feed
- Today's NYT Connections Hints, Answers and Help for April 24, #683 1 hour 42 min old , CNET Feed
- 'The Last of Us' Has a New Enemy in Season 2. Who Are Abby and the WLF? 1 hour 42 min old , CNET Feed
- Microsoft 365 Copilot's Business Version Gets ChatGPT 4o Image Generation 2 hours 45 min old , CNET Feed
- PlayStation Classic Themes Are Returning to PS5 in Next Update 3 hours 32 min old , CNET Feed
- Best Rowing Machines of 2025 for a Full-Body Workout, According to Our Experts 3 hours 42 min old , CNET Feed
- Hubble Space Telescope Is 35: Don't Miss These 4 Dazzling Anniversary Images 4 hours 2 min old , CNET Feed
- ChatGPT's Image Generator Is Coming to More Gen AI Tools 4 hours 42 min old , CNET Feed
- Best Sports Drinks of 2025: The Warmer Months Make Staying Hydrated Vital. Here’s How 4 hours 43 min old , CNET Feed
Computer Weekly
- Mandiant's latest annual threat report reveals new data on how financially-motivated cyber criminals, such as ransomware gangs, dominate the cyber security landscape 38 min 41 sec old , Computer Weekly Feed
- The rise of AI powered threats and non-human identities will push an already strained identity security model over the edge 38 min 41 sec old , Computer Weekly Feed
- Amid an uncertain future for vulnerability research, exposure management company Armis has been given the authority to assign CVE IDs to newly discovered vulnerabilities 8 hours 55 min old , Computer Weekly Feed
- Storage supplier profile: Block, file and object as part of full-stack IT offer for hybrid cloud and containerised applications comes via VSP One arrays and EverFlex as-a-service options 9 hours 56 min old , Computer Weekly Feed
- Computer Weekly talks to Quantum CEO Jamie Lerner about the company’s expertise in massive volumes of data and a roadmap that includes Myriad, a new file system for forever flash in the AI era 11 hours 26 sec old , Computer Weekly Feed
- A cyber attack at Marks & Spencer has caused significant disruption to customers, leaving them unable to make contactless payments or use click-and-collect services 12 hours 7 min old , Computer Weekly Feed
- Suppliers urge technology secretary to work more collaboratively with private sector over concerns government’s digital wallet will gain a monopoly in the market 12 hours 7 min old , Computer Weekly Feed
- Cloud security specialist Qualys partners with US T20 cricket squad San Francisco Unicorns and its Sparkle Army fanclub as the team prepares for its summer 2025 campaign 12 hours 7 min old , Computer Weekly Feed
- The figures for funding of female-led startups are shocking - and the same applies to most underrepresented groups. Tech leaders need to take action or risk missing out on new innovations and opportunities 14 hours 11 min old , Computer Weekly Feed
- A cyber attack at Marks & Spencer has caused significant disruption to customers, leaving them unable to make contactless payments or use click-and-collect services. 1 day 4 hours old , Computer Weekly Feed
US-CERT Feed
- CISA Releases Five Industrial Control Systems Advisories 1 day 9 hours old , US-Cert Current Activity
- CISA Adds Three Known Exploited Vulnerabilities to Catalog 6 days 9 hours old , US-Cert Current Activity
- CISA Releases Six Industrial Control Systems Advisories 6 days 9 hours old , US-Cert Current Activity
- CISA Adds One Known Exploited Vulnerability to Catalog 1 week 9 hours old , US-Cert Current Activity
- CISA Releases Guidance on Credential Risks Associated with Potential Legacy Oracle Cloud Compromise 1 week 9 hours old , US-Cert Current Activity
- CISA Releases Nine Industrial Control Systems Advisories 1 week 1 day old , US-Cert Current Activity
- Fortinet Releases Advisory on New Post-Exploitation Technique for Known Vulnerabilities 1 week 5 days old , US-Cert Current Activity
- CISA Releases Ten Industrial Control Systems Advisories 1 week 6 days old , US-Cert Current Activity
- CISA Adds Two Known Exploited Vulnerabilities to Catalog 2 weeks 9 hours old , US-Cert Current Activity
- CISA Adds Two Known Exploited Vulnerabilities to Catalog 2 weeks 1 day old , US-Cert Current Activity
Krebs
- DOGE Worker’s Code Supports NLRB Whistleblower 57 min 30 sec old , KrebsOnSecurity
- Whistleblower: DOGE Siphoned NLRB Case Data 1 day 19 hours old , KrebsOnSecurity
- Funding Expires for Key Cyber Vulnerability Database 1 week 17 hours old , KrebsOnSecurity
- Trump Revenge Tour Targets Cyber Leaders, Elections 1 week 1 day old , KrebsOnSecurity
- China-based SMS Phishing Triad Pivots to Banks 1 week 6 days old , KrebsOnSecurity
- Patch Tuesday, April 2025 Edition 2 weeks 18 hours old , KrebsOnSecurity
- Cyber Forensic Expert in 2,000+ Cases Faces FBI Probe 2 weeks 5 days old , KrebsOnSecurity
- How Each Pillar of the 1st Amendment is Under Attack 3 weeks 2 days old , KrebsOnSecurity
- When Getting Phished Puts You in Mortal Danger 3 weeks 6 days old , KrebsOnSecurity
SecurityWeek
- AuthMind Raises $19.3 Million in Seed Funding 4 hours 38 min old , Security Week
- Ethical Zero Day Marketplace Desired Effect Emerges From Stealth 7 hours 4 min old , Security Week
- Endor Labs Raises $93 Million for AppSec Platform 7 hours 42 min old , Security Week
- Chainguard Raises Hefty $356M Series D at $3.5 Billion Valuation 7 hours 53 min old , Security Week
- Files Deleted From GitHub Repos Leak Valuable Secrets 9 hours 16 min old , Security Week
- Miggo Security Banks $17M Series A for ADR Technology 9 hours 42 min old , Security Week
- Picnic Corporation Rebrands to VanishID, Raises $10 Million 10 hours 32 min old , Security Week
- Kelly Benefits Data Breach Impacts 260,000 People 11 hours 12 min old , Security Week
- Cyberattack Hits British Retailer Marks & Spencer 11 hours 22 min old , Security Week
- Data Breach at Onsite Mammography Impacts 350,000 11 hours 42 min old , Security Week
Security Wire Daily News
- Ransomware is malware that locks and encrypts a victim's data, files, devices or systems, rendering them inaccessible and unusable until the attacker receives a ransom payment. 1 hour 40 min old , Security Wire Daily News
- Many organizations require document management software that can automate workflows, support remote access and maintain compliance. Top systems include Box and SharePoint Online. 1 day 2 hours old , Security Wire Daily News
- Crypto ransomware is a form of ransomware that uses cryptography to encrypt computer files so that the victim cannot access them. In exchange for the demanded ransom, the attacker claims it will tell the victimized business how to regain access to the... 1 day 2 hours old , Security Wire Daily News
- Docker said it plans new tools integrating the emerging agentic AI standard protocol into existing workflows, including security controls. 1 day 4 hours old , Security Wire Daily News
- Responsible AI is often misunderstood as a way to make sure that a model is safe. However, AI safety examines whether harmful content is being produced or not. 1 day 9 hours old , Security Wire Daily News
- Protecting your organization against ransomware attack entryways could mean the difference between staying safe or falling victim to a devastating breach. 2 days 2 hours old , Security Wire Daily News
- Quantum is on the horizon -- is your organization ready to migrate to post-quantum cryptographic algorithms? Make a CBOM to understand where risky encryption algorithms are used. 2 days 3 hours old , Security Wire Daily News
- A brute-force attack is a trial-and-error hacking method cybercriminals use to decode login information and encryption keys to gain unauthorized access to systems. 2 days 5 hours old , Security Wire Daily News
- A mobile virtual private network (mobile VPN) is a type of VPN specifically designed to maintain a stable and secure connection while a user moves across different networks. 2 days 7 hours old , Security Wire Daily News
- Cybercriminals have various methods at their disposal to hack and exploit credit card information. Learn what they are, how to prevent them and what to do when hacked. 5 days 2 hours old , Security Wire Daily News
Security Wire Weekly
- As your organization's first line of defense, hold regular employee training on how to prevent, detect and respond to ransomware attacks. 1 week 2 days old , Security Wire Weekly
- The Anthropic-led spec for AI agent tool connections gains further momentum this week, with support from cloud-native infrastructure vendors such as Kubiya and Solo.io. 2 weeks 6 days old , Security Wire Weekly
- You don't have to build your blockchain project from the ground up. These cloud-based service providers can provide the necessary infrastructure, networking and development tools. 3 weeks 53 min old , Security Wire Weekly
- Tabletop games and live-fire exercises are two ways to test the effectiveness of enterprise security controls and defenses. Discover how each works and how they differ. 3 weeks 53 min old , Security Wire Weekly
- Ensuring the security of your company's online payment systems is key to preventing costly attacks, meeting compliance requirements and maintaining customer trust. 3 weeks 53 min old , Security Wire Weekly
- Tailgating, sometimes referred to as piggybacking, is a type of physical security breach in which an unauthorized person follows an authorized individual to enter secured premises while avoiding detection by an electronic or human access control (or... 3 weeks 53 min old , Security Wire Weekly
- Organizational security is undermined by a number of identity and access management problems. Learn what those risks are and get ideas on how to solve them. 3 weeks 53 min old , Security Wire Weekly
- One of the most important goals of cybersecurity professionals is to quickly identify potential or in-progress cyberattacks. These three approaches can help. 3 weeks 53 min old , Security Wire Weekly
- Endpoint detection and response (EDR) is a system that gathers and analyzes security threat-related information from computer workstations and other endpoints. 3 weeks 53 min old , Security Wire Weekly
- IPsec (Internet Protocol Security) is a suite of protocols and algorithms for securing data transmitted over the internet or any public network. 3 weeks 53 min old , Security Wire Weekly
Security News White Papers
Cloud Security Briefing New and Advice
- RSA Conference 2025 2 weeks 5 days old , Cloud Security Briefing: News and Advice
- While prevention is key, it's not enough to protect a company's systems from ransomware. Learn how early detection with these four methods helps reduce damage from attacks. 2 weeks 6 days old , Cloud Security Briefing: News and Advice
- If your company is using a cloud database, it's critical to stay on top of security. Review the security features offered by top cloud providers, plus some best practices. 3 weeks 53 min old , Cloud Security Briefing: News and Advice
- CASB tools help secure cloud applications so only authorized users have access. Discover more about this rapidly evolving technology and its use cases. 3 weeks 53 min old , Cloud Security Briefing: News and Advice
- Before jumping feet first into the cloud, understand the new and continuing top cloud security challenges your organization is likely to face -- and how to mitigate them. 3 weeks 53 min old , Cloud Security Briefing: News and Advice
- Most enterprises have siloed departments, but SASE's convergence of network and security functions is disrupting those constructs and driving the need for more team communication. 3 weeks 53 min old , Cloud Security Briefing: News and Advice
- The Cloud Security Alliance (CSA) is a nonprofit organization that promotes research into best practices for securing cloud computing and the use of cloud technologies to secure other forms of computing. 3 weeks 53 min old , Cloud Security Briefing: News and Advice
- What are the necessary components of a cloud security policy, and why should an organization go to the trouble to create one? Download a template to get the process started. 3 weeks 53 min old , Cloud Security Briefing: News and Advice
- This cloud security guide explains challenges enterprises face today; best practices for securing and managing SaaS, IaaS and PaaS; and comparisons of cloud-native security tools. 3 weeks 53 min old , Cloud Security Briefing: News and Advice
- Automating security in the cloud can be invaluable for threat detection and mitigation. Explore key areas where security professionals should implement automation. 3 weeks 53 min old , Cloud Security Briefing: News and Advice
Threat Post
Naked Security
CSO Online
InfoSec Island
Schneier on Security
Tripwire
Wired Security
- The Tech That Safeguards the Conclave’s Secrecy 15 hours 42 min old , Wired Security
- How to Protect Yourself From Phone Searches at the US Border 2 days 11 hours old , Wired Security
- Florida Man Enters the Encryption Wars 4 days 12 hours old , Wired Security
- ICE Is Paying Palantir $30 Million to Build ‘ImmigrationOS’ Surveillance Platform 5 days 6 hours old , Wired Security
- New Jersey Sues Discord for Allegedly Failing to Protect Children 6 days 6 hours old , Wired Security
- This ‘College Protester’ Isn’t Real. It’s an AI-Powered Undercover Bot for Cops 6 days 11 hours old , Wired Security
- 'Stupid and Dangerous': CISA Funding Chaos Threatens Essential Cybersecurity Program 1 week 1 hour old , Wired Security
- Here’s What Happened to Those SignalGate Messages 1 week 1 day old , Wired Security
- Suspected 4chan Hack Could Expose Longtime, Anonymous Admins 1 week 1 day old , Wired Security
- Microsoft’s Recall AI Tool Is Making an Unwelcome Return 1 week 2 days old , Wired Security
Dark Reading
NoticeBored
The Security Ledger
- Lattica Emerges from Stealth to Solve AI’s Biggest Privacy Challenge with FHE 8 hours 42 min old , The Security Ledger
- Criminal IP to Showcase Advanced Threat Intelligence at RSAC™ 2025 1 day 7 hours old , The Security Ledger
- Industry First: StrikeReady AI Platform Moves Security Teams Beyond Basic, One-Dimensional AI-Driven Triage Solutions 2 days 9 hours old , The Security Ledger
- SquareX to Uncover Data Splicing Attacks at BSides San Francisco, A Major DLP Flaw that Compromises Data Security of Millions 1 week 8 hours old , The Security Ledger
- Gcore Super Transit Brings Advanced DDoS Protection and Acceleration for Superior Enterprise Security and Speed 2 weeks 10 hours old , The Security Ledger
- SpyCloud Research Shows that Endpoint Detection and Antivirus Solutions Miss Two-Thirds (66%) of Malware Infections 2 weeks 2 days old , The Security Ledger
- Secure Ideas Achieves CREST Accreditation and CMMC Level 1 Compliance 2 weeks 6 days old , The Security Ledger
- Brinker Named Among “10 Most Promising Defense Tech Startups of 2025” 3 weeks 8 hours old , The Security Ledger
- SquareX Discloses Browser-Native Ransomware that Puts Millions at Risk 3 weeks 5 days old , The Security Ledger
- G2 Names INE 2025 Cybersecurity Training Leader 3 weeks 6 days old , The Security Ledger
Electronic Freedom Foundation
- Digital Identities and the Future of Age Verification in Europe 12 hours 54 min old , EFF
- Florida’s Anti-Encryption Bill Is a Wrecking Ball to Privacy. There's Still Time to Stop It. 23 hours 7 min old , EFF
- Why the FTC v. Meta Trial Matters: Competition Gaps and Civil Liberties Opportunities 2 days 1 hour old , EFF
- EFF to Congress: Here’s What A Strong Privacy Law Looks Like 2 days 3 hours old , EFF
- Six Years of Dangerous Misconceptions Targeting Ola Bini and Digital Rights in Ecuador 5 days 3 hours old , EFF
- Congress Moves Closer to Risky Internet Takedown Law | EFFector 37.4 1 week 4 hours old , EFF
- EFF Urges Court to Avoid Fair Use Shortcuts in Kadrey v. Meta Platforms 1 week 1 day old , EFF
- Privacy on the Map: How States Are Fighting Location Surveillance 1 week 1 day old , EFF
- Florida’s New Social Media Bill Says the Quiet Part Out Loud and Demands an Encryption Backdoor 1 week 5 days old , EFF
- Cybersecurity Community Must Not Remain Silent On Executive Order Attacking Former CISA Director 1 week 5 days old , EFF
Network World
InfoWorld
Cisco
- Multiple Cisco Products Unauthenticated Remote Code Execution in Erlang/OTP SSH Server 16 hours 57 min old , Cisco Security Advisories
- Cisco Secure Network Analytics Privilege Escalation Vulnerability 6 days 22 hours old , Cisco Security Advisories
- Cisco Webex App Client-Side Remote Code Execution Vulnerability 6 days 22 hours old , Cisco Security Advisories
- Cisco Nexus Dashboard LDAP Username Enumeration Vulnerability 6 days 22 hours old , Cisco Security Advisories
- Cisco NX-OS Software Image Verification Bypass Vulnerability 2 weeks 1 day old , Cisco Security Advisories
- Cisco Evolved Programmable Network Manager and Cisco Prime Infrastructure Stored Cross-Site Scripting Vulnerabilities 2 weeks 6 days old , Cisco Security Advisories
- Cisco Meraki MX and Z Series AnyConnect VPN Denial of Service Vulnerability 2 weeks 6 days old , Cisco Security Advisories
- Cisco Enterprise Chat and Email Denial of Service Vulnerability 2 weeks 6 days old , Cisco Security Advisories
- Cisco Webex for BroadWorks Credential Exposure Vulnerability 3 weeks 18 hours old , Cisco Security Advisories
- Cisco Smart Licensing Utility Vulnerabilities 3 weeks 19 hours old , Cisco Security Advisories
Corero Security
SlashDot
- AI Secretly Helped Write California Bar Exam, Sparking Uproar 38 min 41 sec old , SlashDot
- Meta Rolls Out Live Translations To All Ray-Ban Smart Glasses Users 38 min 41 sec old , SlashDot
- Nintendo Seeks Discord User's Identity Following Major Pokemon Leak 2 hours 40 min old , SlashDot
- OpenAI Forecasts Revenue Topping $125 Billion in 2029 as Agents, New Products Gain 2 hours 40 min old , SlashDot
- Apple, Meta Fined as EU Presses Ahead With Tech Probes 3 hours 46 min old , SlashDot
- Amazon's Starlink Rival Struggles To Ramp Up Satellite Production 4 hours 49 min old , SlashDot
- More Than 80% of the World's Reefs Hit By Bleaching After Worst Global Event On Record 4 hours 49 min old , SlashDot
- UBS and Gartner Trim Smartphone, PC Forecasts Amid Tariff Fears 5 hours 54 min old , SlashDot
- On YouTube's 20th Anniversary, the Platform Says Over 20 Trillion Videos Have Been Uploaded 5 hours 54 min old , SlashDot
- Deep-Sea Fishers Fight for Wi-Fi 6 hours 54 min old , SlashDot
Hacker News
- FontDiffuser: Text to Font 46 min 16 sec old , Hacker News
- Using a tool that finds fake online profiles to detect abnormal protein activity 47 min 13 sec old , Hacker News
- Ask HN: What Have You Replaced with AI? 47 min 21 sec old , Hacker News
- The Next Computer? Your Glasses [video] 48 min 21 sec old , Hacker News
- Google blocked Motorola use of Perplexity AI, witness says 50 min 15 sec old , Hacker News
- Choose Europe Macron invites scientists to work in France amid US funding cuts 50 min 39 sec old , Hacker News
- Draft executive order outlines plan to integrate AI into K-12 schools 52 min 11 sec old , Hacker News
- Official APIs for GPT-4o Image Just Added 52 min 16 sec old , Hacker News
- Wild chimps sharing 'boozy' fruit caught on camera 52 min 27 sec old , Hacker News
- Doge Worker's Code Supports NLRB Whistleblower 53 min 37 sec old , Hacker News
Security Now
- SN 1021: Device Bound Session Credentials - Hotpatching in Win 11, Apple vs. UK 1 week 18 hours old , Security Now
- SN 1020: Multi-Perspective Issuance Corroboration - IoT Done Right, France Phishes, Gmails E2EE 2 weeks 18 hours old , Security Now
- SN 1019: EU OS - Troy Hunt Phished, Ransomware List, InControl 3 weeks 18 hours old , Security Now
- SN 1018: The Quantum Threat - ESP32 Backdoor Update, RCS E2EE 4 weeks 19 hours old , Security Now
Tao Security
Graham Cluely
- The AI Fix #47: An AI is the best computer programmer in the world 1 day 7 hours old , Graham Cluely Security Blog
- Crosswalks hacked to play fake audio of Musk, Zuck, and Jeff Bezos 1 day 13 hours old , Graham Cluely Security Blog
- Smashing Security podcast #413: Hacking the hackers… with a credit card? 6 days 22 hours old , Graham Cluely Security Blog
- Insurance firm Lemonade warns of breach of thousands of driving license numbers 1 week 11 hours old , Graham Cluely Security Blog
- RansomHouse ransomware: what you need to know 1 week 1 day old , Graham Cluely Security Blog
- The AI Fix #46: AI can read minds now, and is your co-host a clone? 1 week 1 day old , Graham Cluely Security Blog
- Medusa ransomware gang claims to have hacked NASCAR 1 week 2 days old , Graham Cluely Security Blog
- Ransomware reaches a record high, but payouts are dwindling 1 week 5 days old , Graham Cluely Security Blog
- Smashing Security podcast #412: Signalgate sucks, and the quandary of quishing 1 week 6 days old , Graham Cluely Security Blog
- The AI Fix #45: The Turing test falls to GPT-4.5 2 weeks 22 hours old , Graham Cluely Security Blog
Google Security Blog
- Google announces Sec-Gemini v1, a new experimental cybersecurity model 2 weeks 5 days old , Google Security Blog
- Taming the Wild West of ML: Practical Model Signing with Sigstore 2 weeks 5 days old , Google Security Blog
- New security requirements adopted by HTTPS certificate industry 3 weeks 6 days old , Google Security Blog
Microsoft
- Stopping attacks against on-premises Exchange Server and SharePoint Server with AMSI 2 weeks 4 hours old , Microsoft Malware Protection Center
- How cyberattackers exploit domain controllers using ransomware 2 weeks 5 hours old , Microsoft Malware Protection Center
- Exploitation of CLFS zero-day leads to ransomware activity 2 weeks 1 day old , Microsoft Malware Protection Center
- Meet the Deputy CISOs who help shape Microsoft’s approach to cybersecurity 2 weeks 1 day old , Microsoft Malware Protection Center
- Tech Accelerator: Azure security and AI adoption 2 weeks 2 days old , Microsoft Malware Protection Center
- Threat actors leverage tax season to deploy tax-themed phishing campaigns 2 weeks 6 days old , Microsoft Malware Protection Center
- Transforming public sector security operations in the AI era 3 weeks 1 day old , Microsoft Malware Protection Center
- Analyzing open-source bootloaders: Finding vulnerabilities faster with AI 3 weeks 2 days old , Microsoft Malware Protection Center
- New innovations in Microsoft Purview for protected, AI-ready data 3 weeks 2 days old , Microsoft Malware Protection Center
- US Department of Labor’s journey to Zero Trust security with Microsoft Entra ID 3 weeks 6 days old , Microsoft Malware Protection Center
Tech Crunch
PC Magazine Security
Paul's Security Weekly
ZDNet Security
- The 4 VPNs I swear by for Linux - and why I trust them 4 hours 49 min old , ZDNet Security
- Best antivirus for Mac in 2025: I tested your top software options 12 hours 42 min old , ZDNet Security
- Tired of unsolicited nude pics? Google's new safety feature can help - how it works 1 day 6 hours old , ZDNet Security
- NymVPN: Introducing a security-first decentralized VPN with a Mixnet flair 1 day 7 hours old , ZDNet Security
- The best Bluetooth trackers of 2025: Expert tested 2 days 2 hours old , ZDNet Security
- I replaced my Ring with this outdoor security camera - and it has no subscription 2 days 7 hours old , ZDNet Security
- Motorola to outfit first responders with new AI-enabled body cameras 2 days 9 hours old , ZDNet Security
- That Google email look real? Don't click - it might be scam. Here's how to tell 5 days 4 hours old , ZDNet Security
- Think GeoGuessr is fun? Try using ChatGPT to guess locations in your photos 5 days 7 hours old , ZDNet Security
- Data-stealing cyberattacks are surging - 7 ways to protect yourself and your business 6 days 11 hours old , ZDNet Security
The Gaurdian
TechWorld Security
Malware Bytes
- All Gmail users at risk from clever replay attack 1 day 8 hours old , Malware Bytes Security
- A week in security (April 12 – April 18) 2 days 14 hours old , Malware Bytes Security
- Did DOGE “breach” Americans’ data? (Lock and Code S06E08) 2 days 21 hours old , Malware Bytes Security
- Did DOGE “breach” Americans’ data? (Lock and Code S06E08) 2 days 21 hours old , Malware Bytes Security
- Text scams grow to steal hundreds of millions of dollars 5 days 5 hours old , Malware Bytes Security
- Apple patches security vulnerabilities in iOS and iPadOS. Update now! 6 days 5 hours old , Malware Bytes Security
- Hi, robot: Half of all internet traffic now automated 1 week 17 min old , Malware Bytes Security
- “I sent you an email from your email account,” sextortion scam claims 1 week 6 hours old , Malware Bytes Security
- “Follow me” to this fake crypto exchange to claim $500 1 week 23 hours old , Malware Bytes Security
- Hertz data breach caused by CL0P ransomware attack on vendor 1 week 1 day old , Malware Bytes Security