Threat Intelligence

2026-05-01 00:00

US ransomware negotiators get 4 years in prison over BlackCat attacks

US ransomware negotiators get 4 years in prison over BlackCat attacks

Two former employees of cybersecurity incident response companies Sygnia and DigitalMint were sentenced to four years in prison each for targeting U.S. companies in BlackCat (ALPHV) ransomware...

Read Article

2026-05-01 00:00

Microsoft now lets admins choose pre-installed Store apps to uninstall

Microsoft now lets admins choose pre-installed Store apps to uninstall

Microsoft has updated a Windows 11 in-box app removal policy introduced in October to include a dynamic list that lets IT admins choose which preinstalled Store apps to uninstall. The updated...

Read Article

2026-05-01 00:00

Windows 11 KB5083631 update released with 34 changes and fixes

Windows 11 KB5083631 update released with 34 changes and fixes

Microsoft has released the KB5083631 optional cumulative update for Windows 11, which includes 34 changes, such as a new Xbox mode for Windows PCs, enhanced security and performance for batch files,...

Read Article

2026-05-01 00:00

Top Five Sales Challenges Costing MSPs Cybersecurity Revenue

Top Five Sales Challenges Costing MSPs Cybersecurity Revenue

The managed security services market is projected to grow from $38.31 billion in 2025 to $69.16 billion by 2030[1], with cybersecurity being the fastest-growing sector[2]. Despite this opportunity,...

Read Article

2026-05-01 00:00

Two Cybersecurity Professionals Get 4-Year Sentences in BlackCat Ransomware Attacks

Two Cybersecurity Professionals Get 4-Year Sentences in BlackCat Ransomware Attacks

The U.S. Department of Justice (DoJ) on Thursday announced the sentencing of two cybersecurity professionals to four years each in prison for their role in facilitating BlackCat ransomware attacks in...

Read Article

2026-05-01 00:00

Poisoned Ruby Gems and Go Modules Exploit CI Pipelines for Credential Theft

Poisoned Ruby Gems and Go Modules Exploit CI Pipelines for Credential Theft

A new software supply chain attack campaign has been observed using sleeper packages as a conduit to subsequently push malicious payloads that enabled credential theft, GitHub Actions tampering, and...

Read Article