Attack

Malicious AI Server Steals Emails via Postmark MCP Breach
Identity & Access Management Malicious AI Server Steals Emails via Postmark MCP Breach

What if the very tools trusted to streamline daily tasks turned against their users, quietly siphoning off sensitive data like emails and invoices? This chilling reality has struck hundreds of organizations as a once-reliable AI server, designed to manage email workflows, has been exposed as a

How Do Third-Party Cyberattacks Disrupt Airport Operations?
Security Operations & Management How Do Third-Party Cyberattacks Disrupt Airport Operations?

In an era where digital systems underpin nearly every aspect of modern travel, airports have become increasingly dependent on third-party software to manage everything from passenger check-ins to baggage handling, making them vulnerable to disruptions. A recent cyberattack on Collins Aerospace’s

How Did a Cyberattack Disrupt European Airport Operations?
Malware & Threats How Did a Cyberattack Disrupt European Airport Operations?

In a startling turn of events, a sophisticated cyberattack recently swept through several major European airports, grinding critical operations to a halt and leaving thousands of passengers stranded. The incident, which unfolded late on a Friday, targeted essential check-in systems, leading to

Kimsuky Uses AI Deepfakes for South Korean Cyber Attacks
Malware & Threats Kimsuky Uses AI Deepfakes for South Korean Cyber Attacks

I'm thrilled to sit down with Rupert Marais, our in-house security specialist with deep expertise in endpoint and device security, cybersecurity strategies, and network management. With a wealth of experience in tackling sophisticated cyber threats, Rupert is the perfect person to shed light on the

Chinese Hackers Impersonate US Lawmaker in Cyberattack
Malware & Threats Chinese Hackers Impersonate US Lawmaker in Cyberattack

In a startling revelation that underscores the escalating dangers of cyber warfare, a sophisticated cyberespionage campaign allegedly orchestrated by China-backed hackers has come to light, targeting none other than a prominent US lawmaker. This audacious attack involved impersonating

How Did a Phishing Attack Compromise 2 Billion npm Downloads?
Identity & Access Management How Did a Phishing Attack Compromise 2 Billion npm Downloads?

In a staggering breach of digital trust, a sophisticated phishing attack recently infiltrated the npm ecosystem, a cornerstone of JavaScript development, compromising packages that collectively amass over 2 billion weekly downloads. This incident not only exposed the fragility of open-source

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later