Threat Intelligence

2026-05-01 00:00

Two US Security Experts Sentenced to Prison for Helping Ransomware Gang

Two US Security Experts Sentenced to Prison for Helping Ransomware Gang

This website is using a security service to protect itself from online attacks. The action you just performed triggered the security solution. There are several actions that could trigger this block...

Read Article

2026-05-01 00:00

Sophisticated Deep#Door Backdoor Enables Espionage, Disruption

Sophisticated Deep#Door Backdoor Enables Espionage, Disruption

This website is using a security service to protect itself from online attacks. The action you just performed triggered the security solution. There are several actions that could trigger this block...

Read Article

2026-05-01 00:00

Cisco Releases Open Source Tool for AI Model Provenance

Cisco Releases Open Source Tool for AI Model Provenance

This website is using a security service to protect itself from online attacks. The action you just performed triggered the security solution. There are several actions that could trigger this block...

Read Article

2026-04-30 00:00

Anti-DDoS Firm Heaped Attacks on Brazilian ISPs

Anti-DDoS Firm Heaped Attacks on Brazilian ISPs

A Brazilian tech firm that specializes in protecting networks from distributed denial-of-service (DDoS) attacks has been enabling a botnet responsible for an extended campaign of massive DDoS attacks...

Read Article

2026-04-30 00:00

Anthropic Unveils Claude Security to Counter AI-Powered Exploit Surge

Anthropic Unveils Claude Security to Counter AI-Powered Exploit Surge

Mythos in the hands of attackers threatens a storm beyond the power of security teams to weather. Claude Security is designed to counter this. Anthropic’s Mythos AI model will not be the only...

Read Article

2026-04-30 00:00

AI Fuels ‘Industrial’ Cybercrime as Time-to-Exploit Shrinks to Hours

AI Fuels ‘Industrial’ Cybercrime as Time-to-Exploit Shrinks to Hours

Industrialized cybercrime now delivers attacks with greater scale, speed and success. Defenders must match this with a similar use of AI and automation. The industrialization of cybercrime began in...

Read Article