Hacktivists Claim DHS Breach, Leak 6,600+ ICE Contractor Records

Hacktivists claim they breached DHS systems, leaking records tied to 6,681 ICE contractor applicants, including major tech and defense firms. The post Hacktivists Claim DHS Breach, Leak 6,600+ ICE... Read more »

Chrome Extension Hijacked to Deliver Malware, Steal Crypto Wallets

A compromised Chrome extension with 7,000 users was updated to deploy malware, strip security headers, and steal cryptocurrency wallet seed phrases. The post Chrome Extension Hijacked to Deliver Malware,... Read more »

Oracle EBS 2025 campaign impacts Madison Square Garden, sensitive data leaked

Madison Square Garden confirmed a data breach tied to the 2025 Oracle E-Business Suite hacking campaign. Madison Square Garden (MSG) has confirmed it was affected by a data breach... Read more »

Fig Security emerges from stealth with $38 million to resilience-proof enterprise security

Fig Security, a new platform that finds and fixes broken security flows across your entire SecOps infrastructure, has launched from stealth with $38 million across Seed and Series A... Read more »

Cloudflare tracked 230 billion daily threats and here is what it found

Cloudflare’s network blocks over 230 billion threats per day. The volume indicates how routine and automated the attack cycle has become, and the patterns behind that volume point to... Read more »

Threat actors weaponize OAuth redirection logic to deliver malware

An ongoing phishing campaign is abusing the OAuth authentication redirection mechanism to avoid triggering conventional email and browser defenses, Microsoft researchers have revealed. The attackers are targeting government and... Read more »

$100 radio equipment can track cars through their tire sensors

When people consider what might track their movements, they think of smartphone apps, GPS services, or roadside cameras. The tires of a new car rarely enter that equation. Researchers... Read more »

Josys centralizes identity data to replace manual IT oversight with automated governance

Josys has transitioned into an autonomous identity governance platform, expanding beyond traditional SaaS management. The enhanced platform empowers IT leaders and managed service providers (MSPs) to scale governance and... Read more »

RecordPoint MCP Server standardizes and secures AI access to compliant data

RecordPoint has unveiled its model context protocol (MCP) server, giving enterprises a secure, standardized way to expose governed data to external AI agents and platforms. The RecordPoint MCP Server... Read more »

ProcessUnity Risk Index delivers controls-driven vendor risk scoring for TPRM

ProcessUnity has introduced ProcessUnity Risk Index, a risk rating built specifically for third-party risk management programs, combining proprietary control intelligence with external threat and vulnerability data. ProcessUnity Risk Index... Read more »
Subscribe to our Newsletter