
Blog
-
Malicious Go Modules designed to wipe Linux systems
Researchers found 3 malicious Go modules with hidden code that can download payloads to wipe a Linux system’s main disk,…
-
Cybersecurity Weekly Newsletter: Key Attacks and Vulnerabilities From Last Week
In our fast-paced, interconnected world, the dangers of cyberattacks are becoming more frequent and complex. That’s why it’s more important…
-
SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 44
Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape————————————————————————————————————————————-[io_uring Is…
-
Data Breach at Fowler Elementary School District: The Interlock Ransomware Group’s Attack
It sounds like yet another K-12 school district has fallen prey to a cyberattack that it never successfully detected or…
-
Disney Hacker Who Accessed 1.1 Terabytes of Data Pleads Guilty
There’s an update to a previously reported breach claimed by ‘Nullbulge.’ Pirates and Princesses reports: A California resident has pleaded…
-
Patients left in the dark months almost a year after criminals leaked sensitive medical data from Sy
Alexander Martin reports: More than 11 months after a ransomware group published information from a U.K. pathology services company, the…
-
Security Affairs newsletter Round 522 by Pierluigi Paganini – INTERNATIONAL EDITION
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs are free…
-
Microsoft ends Authenticator password autofill, moves users to Edge
Microsoft has announced that it will discontinue the password storage and autofill feature in the Authenticator app starting in July…
-
Google NotebookLM is now using Gemini 2.5 Flash
Google NotebookLM, which is a research and note-taking AI tool, is getting upgraded to Gemini 2.5 Flash.NotebookLM has been…
-
RSAC 2025 wrap-up – Week in security with Tony Anscombe
VideoRSAC 2025 wrap-up — Week in security with Tony Anscombe========================================================From the power of collaborative defense to identity security and AI,…

