Beyond Mimo’lette: Tracking Mimo’s Expansion to Magento CMS and Docker

This post reports on activity from the 'Mimo' threat actor. - Read more

SonicWall Secure Mobile Access Attack

A campaign targeting SonicWall SMA 100 series appliances is currently under active exploitation, leveraging both known vulnerabilities and potential zero-days to gain persistent access...

NoBooze1 Malware Targets TP-Link Routers via CVE-2019-9082

Sensor Intel Series: July 2025 CVE Trends - Read more

Elastic strengthens AI security integration with Microsoft Azure AI Foundry Model Catalog

Elastic’s partnership with Microsoft and integration with the Azure AI Foundry Model Catalog showcases our dedication to harnessing a full range of AI capabilities...

‘Hacking is assumed now’: experts raise the alarm about added risk of surveillance cameras...

As governments consider mandatory CCTV in early education, one big provider with cameras already installed is yet to formalise guidelines for how the footage...

Louis Vuitton says UK customer data stolen in cyber-attack

Lead brand of French luxury group LVMH reassures customers financial data such as bank details were not takenLouis Vuitton has said the data of...

What is Quantum Computing?

Quantum computing enhances information processing, impacting cryptography and emphasizing the need for quantum-resistant technologies. - Read more

We’ve Issued Our First IP Address Certificate

Since Let’s Encrypt started issuing certificates in 2015, people have repeatedly requested the ability to get certificates for IP addresses, an option that only...

Expiration Notification Service Has Ended

Since its inception, Let’s Encrypt has been sending expiration notification emails to subscribers that have provided an email address to us via the ACME...

Langflow Unauth RCE Attack

FortiGuard Labs has observed a significant uptick in attacks targeting Langflow, leveraging a recently discovered authentication bypass vulnerability that allows unauthenticated remote attackers to...

Latest article

Chromium: CVE-2026-2319 Race in DevTools

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see (https://chromereleases.googleblog.com/2024 ) for more information. -...

Substack Breach May Have Leaked Nearly 700,000 User Details Online

Substack says hackers accessed user emails, phone numbers, and internal metadata in October 2025, with a database of 697,313 records later posted online. The post...

Cryptojacking Campaign Exploits Driver to Boost Monero Mining

Cryptojacking campaign used pirated software to deploy a persistent XMRig miner with stealth tactics - Read more

The Phone is Listening: A Cold War–Style Vulnerability in Modern VoIP

I don’t know about you, but when I think about “critical vulnerabilities,” I usually picture ransomware, data theft, or maybe a server falling over...