Threat actors have migrated to other phishing-as-a-service (PhaaS) platforms after Tycoon 2FA’s disruption and are reusing its tools, cybersecurity firm…
Browsing: Cybersecurity
Ravie LakshmananApr 18, 2026Money Laundering / Regulatory Compliance Grinex, a Kyrgyzstan-incorporated cryptocurrency exchange sanctioned by the U.K. and the U.S.…
The security researcher who earlier this month published a proof-of-concept (PoC) exploit for a zero-day privilege escalation vulnerability in Microsoft…
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) warned on Thursday that a high-severity Apache ActiveMQ vulnerability patched earlier this…
A congressional subcommittee on Thursday held a roundtable discussion on the potential of artificial intelligence, which took a turn toward…
Ravie LakshmananApr 18, 2026IoT Security / Vulnerability Threat actors are exploiting security flaws in TBK DVR and end‑of‑life (EoL) TP-Link…
The underground market for stolen credit card data has long operated as a volatile and highly deceptive ecosystem, where even…
Kamerin Stokes, a 23-year-old from Memphis, Tennessee, has been sentenced to prison for his role in a 2022 credential stuffing…
Ravie LakshmananApr 17, 2026DDoS / Cybercrime An international law enforcement operation has taken down 53 domains and arrested four people…
Authorities around the world seized more than 50 websites associated with DDoS “booter” services.
