In an update to a joint advisory with CISA and the Australian Cyber Security Centre, the FBI said that the Play ransomware gang had breached roughly 900 organizations as of May 2025, three times the number of victims reported in October 2023. […]
Category Archives: News
Written by Candy Alexander & Jim Reavis.
Many organizations are realizing the benefits of leveraging “fractional” leaders in their C-suites. The ability to work with individuals with deep-seated expertise on an “as needed” basis, whether it is a few hours a week or more hours needed with project implementations, enables the business to work industry experts in a way that is affordable. This is nothing new or trendy. Fractional C’s include CFOs, COOs, CISOs, CTOs, CIOs, a…
The Ukrainian police arrested a 35-year-old hacker who breached 5,000 accounts at an international hosting company and used them to mine cryptocurrency, resulting in $4.5 million in damages. […]
Cisco has released patches to address three vulnerabilities with public exploit code in its Identity Services Engine (ISE) and Customer Collaboration Platform (CCP) solutions. […]
The Main Intelligence Directorate (GUR) of Ukraine’s Ministry of Defense claims it hacked the Russian aerospace and defense company Tupolev, which develops Russia’s supersonic strategic bombers. […]

Earlier today, law enforcement seized multiple domains of BidenCash, the infamous dark web market for stolen credit cards, personal information, and SSH access. […]
Hello Windows Insiders, today we are releasing Windows 11 Insider Preview Build 27871 to the Canary Channel.
We are also not planning to release SDKs for 27xxx series builds for the time being.
What’s
The post Announcing Windows 11 Insider Preview Build 27871 (Canary Channel) appeared first on Windows Blog.
The FBI is warning about a new scam where cybercriminals exploit NFT airdrops on the Hedera Hashgraph network to steal crypto from cryptocurrency wallets. […]
Google has disclosed details of a financially motivated threat cluster that it said “specialises” in voice phishing (aka vishing) campaigns designed to breach organizations’ Salesforce instances for large-scale data theft and subsequent extortion.
The tech giant’s threat intelligence team is tracking the activity under the moniker UNC6040, which it said exhibits characteristics that align with
The tech giant’s threat intelligence team is tracking the activity under the moniker UNC6040, which it said exhibits characteristics that align with