Subscribe
Sign in
Latest
Top
Attackers Exploit SonicWall Vulnerability to Deploy Akira Ransomware
Poor practices and inadequate protection allowed Akira to spread.
Sep 9
•
Martin Szudarski
The node.js Package Manager has Been Under Attack
North Korean attackers are flooding the NPM Registry with malicious package.
Sep 2
•
Martin Szudarski
August 2025
AI Vulnerability: Amazon Q Developer Tool Hack Could Wipe Systems
Part Three of a series of recently found AI Vulnerabilities in Major AI Provider Models.
Aug 29
•
Martin Szudarski
AI Vulnerability: Google Gemini Can Be Exploited to Steal Credentials
Part two of a series of recently found AI Vulnerabilities in Major AI Provider Models.
Aug 27
•
Martin Szudarski
AI Vulnerability: The MS Copilot “EcoLeak” Vulnerability
Part One of a series of recently found AI Vulnerabilities in Major AI Provider Models.
Aug 25
•
Martin Szudarski
Seven Ways Mobile Devices can be Hacked
You rely on your phone. Here are a few tips to keep it safe.
Aug 5
•
Martin Szudarski
July 2025
Some Key Takeaways from the Q1 Cybersecurity Summary
Malicious acters are stepping up efforts to break into networks and computers.
Jul 29
•
Martin Szudarski
On-Premise MS SharePoint Servers are the Latest Target
China-linked hacking groups are targeting on premise SharePoint servers.
Jul 25
•
Martin Szudarski
The Grafana Ghost XSS Flaw Exposes Servers to Account Takeover
Even Open Source, Free, and Managed versions can have vulnerabilities.
Jul 24
•
Martin Szudarski
Major Microsoft Client and Server Systems Reach End of Life
What will it mean for your business?
Jul 22
•
Martin Szudarski
Malicious Versions of the Termius app are Spreading macOS Malware
MacOS Security is overlooked and these attacks prove it.
Jul 16
•
Martin Szudarski
Cybercriminals are Manipulating Markets in $700+ Million Illicit Trading Spree
Regulators, Governments and Investors Struggle to Cope
Jul 15
•
Martin Szudarski
This site requires JavaScript to run correctly. Please
turn on JavaScript
or unblock scripts