Attackers Don’t Just Send Phishing Emails. They Weaponize Your SOC’s Workload
The most dangerous phishing campaigns aren’t just designed to fool employees. Many…
The 3 Steps CISOs Must Follow
Every CISO knows the uncomfortable truth about their Security Operations Center: the…
How Modern SOC Teams Use AI and Context to Investigate Cloud Breaches Faster
The Hacker NewsFeb 17, 2026Cloud Security / Digital Forensics Cloud attacks move…
eScan Antivirus Update Servers Compromised to Deliver Multi-Stage Malware
The update infrastructure for eScan antivirus, a security solution developed by Indian…
New Osiris Ransomware Emerges as New Strain Using POORTRY Driver in BYOVD Attack
Cybersecurity researchers have disclosed details of a new ransomware family called Osiris…
Automated FortiGate Attacks Exploit FortiCloud SSO to Alter Firewall Configurations
Ravie LakshmananJan 22, 2026Network Security / Vulnerability Cybersecurity company Arctic Wolf has…
Black Basta Ransomware Leader Added to EU Most Wanted and INTERPOL Red Notice
Ravie LakshmananJan 17, 2026Law Enforcement / Cybercrime Ukrainian and German law enforcement…
MongoDB Attacks, Wallet Breaches, Android Spyware, Insider Crime & More
Dec 29, 2026Ravie LakshmananHacking News / Cybersecurity Last week's cyber news in…
Trust Wallet Chrome Extension Breach Caused $7 Million Crypto Loss via Malicious Code
Dec 26, 2025Ravie LakshmananCryptocurrency / Incident Response Trust Wallet is urging users…


