Data I/O Becomes Latest Ransomware Attack Victim
Data I/O Becomes Latest Ransomware Attack Victim Summary Data I/O, a Redmond, Washington-based tech manufacturer, disclosed a ransomware incident it detected on 16 August and reported in an 8-K filed…
Data I/O Becomes Latest Ransomware Attack Victim Summary Data I/O, a Redmond, Washington-based tech manufacturer, disclosed a ransomware incident it detected on 16 August and reported in an 8-K filed…
Malicious Scanning Waves Slam Remote Desktop Services Summary Researchers have observed two large waves of coordinated scans targeting Microsoft Remote Desktop Protocol (RDP) authentication portals in late August 2025. GreyNoise…
Citrix Gear Under Active Attack Again With Another Zero-Day Summary Citrix has disclosed three new vulnerabilities in its NetScaler ADC and NetScaler Gateway products. One of them, CVE-2025-7775, is a…
Summary The Philippines used a zero-knowledge proof (ZKP) framework to secure online voting for its 2025 midterm elections, enabling over 57 million voters — including 1.2 million overseas — to…
1M Farmers Insurance Customers’ Data Compromised Summary Farmers Insurance, Farmers Insurance Exchange and affiliated companies filed breach notification documents after a security incident involving a third‑party vendor. The incident occurred…
When One Hospital Gets Ransomware, Others Feel the Pain Summary Ransomware against a single healthcare provider often ripples across entire communities, forcing nearby hospitals to absorb diverted ambulances and unscheduled…
Proof-of-Concept in 15 Minutes? AI Turbocharges Exploitation Summary An AI-driven offensive research pipeline built by two independent Israeli researchers can generate proof-of-concept (PoC) exploit code for real-world vulnerabilities in a…
JSON Config File Leaks Azure ActiveDirectory Credentials Summary Researchers from Resecurity’s HUNTER team discovered an appsettings.json file for an ASP.NET Core application that was publicly accessible on the Internet and…
NIST Enhances Security Controls for Improved Patching Summary The US National Institute of Standards and Technology (NIST) has revised its Security and Privacy Control catalog (version 5.2.0) to strengthen guidance…
Hackers Are Sophisticated & Impatient — That Can Be Good Summary Ensar Seker explains that modern ransomware crews behave like professional SaaS organisations: organised, efficient and driven to move quickly…