Krispy Kreme Data Breach Update: 160,000 Individuals Affected Jordyn Alger June 23, 2025 The time frame between the breach and the notice of affected individuals has some cyber experts concerned. Read More
Vulnerability in Public Repository Could Enable Hijacked LLM Responses Jordyn Alger June 20, 2025 Research reveals a CVSS 8.8 vulnerability, and security leaders are sharing their thoughts. Read More
Transport Solution Company Scania Confirms Cybersecurity Incident Jordyn Alger June 19, 2025 Scania, a transport solution organization, has confirmed it faced a cybersecurity incident. Read More
From Retail to Insurance, Scattered Spider Changes Targets Jordyn Alger June 19, 2025 Scattered Spider, who is believed to be responsible for several cyberattacks against the retail sector in recent months, has apparently shifted targets to the insurance sector. Read More
5 Minutes With How Critical Infrastructure Is Becoming the First AI Trust Battleground Jordyn Alger June 18, 2025 Security magazine talks with Vrajesh Bhavsar, CEO of Operant, about the importance of infrastructure-level protection. Read More
New Research: Multi-Stage Malware Attack on Python Package Index Discovered Jordyn Alger June 18, 2025 Researchers have discovered that the Python Package Index (PyPI) has a malicious package in its repository. Read More
Washington Post Journalists Targeted in Cyberattack Jordyn Alger June 17, 2025 The Washington Post was the subject of a cyberattack. Read More
Fog Ransomware Group Uses Unconventional Toolset, New Research Finds Jordyn Alger June 16, 2025 The Fog ransomware group utilizes an uncommon toolset, including open-source pentesting utilities and an employee monitoring software. Read More
40,000 IoT Security Cameras Are Exposed Online Jordyn Alger June 13, 2025 Research shows that more than 40,000 security cameras across the globe are exposed to the internet. Read More
Security Leaders Discuss the Whole Foods Distributor Cyberattack Jordyn Alger June 12, 2025 Security leaders discuss the Whole Foods distributor cyberattack, with insights on attacker motivations as well as risk mitigation strategies. Read More