
Category: Threat Intel Reports
-
Ukrainian Conti Ransomware Suspect Extradited to US from Ireland
Waqas reports: A Ukrainian national accused of helping run one of the world’s most damaging ransomware operations, Conti, is now…
-
Legal Aid Agency chief admits difficulties understanding impact of cyberattack
Jim Dunton reports: The chief executive of the Legal Aid Agency has told MPs that the organisation is still working…
-
Revealed: Afghan data breach after MoD official left laptop open on train
Holly Bancroft reports: A Ministry of Defence official revealed confidential information by leaving a laptop open on a train in…
-
Snowflake Loses Two More Bids to Dismiss Data Breach Plaintiffs
Cloud company Snowflake’s data breach litigation woes got worse as two bids to dismiss education and financial institutional plaintiffs from…
-
Veradigm’s Breach Claims Under Scrutiny After Dark Web Leak
Veradigm LLC is a health information technology company that provides software solutions to healthcare providers. On September 22, 2025, Veradigm…
-
Russian Police Bust Suspected Meduza Infostealer Developers
Mathew J. Schwartz reports: Russian police arrested ‘three young IT specialists’ suspected of developing and selling the Meduza credential-harvesting malware.…
-
Massive Great Firewall Leak Exposes 500GB of Censorship Data
Mathura Kayir reports: In a historic breach of China’s censorship infrastructure, over 500 gigabytes of internal data were leaked from…
-
UK: Woman charged after NHS patients’ records accessed in data breach
Today’s reminder of the insider threat comes to us from the National Health Service in the U.K. Craig Meighan and…
-
Google confirms AI search will have ads, but they may look different
Google Ads are not going anywhere. Eventually, AI Search results on Google and likely other properties will have ads.Google recently…
-
China-linked hackers exploited Lanscope flaw as a zero-day in attacks
China-linked cyber-espionage actors tracked as ‘Bronze Butler’ (Tick) exploited a Motex Lanscope Endpoint Manager vulnerability as a zero-day to…

