English
Handala ransomware group claims to have targeted Colonel Vered Haimovich, Israel’s top drone commander. The alleged breach highlights the rising threat of cyberattacks against military leaders and the growing intersection of digital warfare and national security.
In a bold move, hacktivist group Handala has published the private chats of Israeli security analyst Raz Zimmt, marking a new chapter in politically motivated cyber-espionage. Here’s what happened—and what it means for digital security.
Handala has released the personal data and photos of 20 IranWire journalists, intensifying cyber intimidation tactics against independent media. This calculated doxxing campaign marks a dangerous escalation in the digital targeting of journalists.
Egypt’s El Wastani Petroleum Company has fallen victim to a major ransomware attack by the Payload group, resulting in the theft of 50GB of sensitive data and raising urgent questions about cyber-resilience in the oil and gas sector.
A catastrophic bug in the Ninja Forms File Upload extension has left tens of thousands of WordPress sites exposed to remote takeover. Here’s how the flaw was exploited, who’s at risk, and why immediate action is critical.
A newly discovered AI flaw in Grafana could have silently leaked sensitive business data through indirect prompt injection. Investigators reveal how the exploit worked, how it was patched, and why vigilance is critical as AI integrates deeper into business tools.
Storm-1175 is redefining cybercrime with rapid-fire Medusa ransomware attacks, exploiting vulnerabilities before organizations can patch. Discover how this group outpaces defenders and what steps can help close the gap.
Pacific West Injury Law became the latest victim of a ransomware attack, highlighting how cybercriminals are increasingly targeting small law firms. Learn how the incident unfolded and what it means for the future of cybersecurity in the legal sector.
The Lynx ransomware gang has listed Smith Dollar, a prominent California law firm, as its latest victim—highlighting the escalating threat of cyber extortion in the legal industry.
The GrafanaGhost vulnerability allows hackers to exfiltrate sensitive data from Grafana dashboards using AI manipulation, all without user awareness. Learn how this silent exploit works and why it signals a shift in cybersecurity challenges.