Toggle navigation
Information Warfare Center
Services
Training
Cyber Range
Cyber Intel Report
Threat Feed
About
Contact
Security Pop Quiz! q392.mp3
News
Packet Storm Security
Security Affairs
*
Emergency fixes deployed by Google and Apple after targeted attacks
*
Notepad++ fixed updater bugs that allowed malicious update hijacking
*
Elastic detects stealthy NANOREMOTE malware using Google Drive as C2
*
U.S. CISA adds an OSGeo GeoServer flaw to its Known Exploited Vulnerabilities catalog
*
Critical Gogs zero-day under attack, 700 servers hacked
Looking Glass Cyber
securingtomorrow.mcafee.com
Quick Heal
Threat Post
*
Student Loan Breach Exposes 2.5M Records
*
Watering Hole Attacks Push ScanBox Keylogger
*
Tentacles of '0ktapus' Threat Group Victimize 130 Firms
*
Ransomware Attacks are on the Rise
*
Cybercriminals Are Selling Access to Chinese Surveillance Cameras
Naked Security
ESET
*
Black Hat Europe 2025: Reputation matters - even in the ransomware economy
*
Locks, SOCs and a cat in a box: What Schrödinger can teach us about cybersecurity
*
Seeking symmetry during ATT&CK® season: How to harness today's diverse analyst and tester landsca
*
The big catch: How whaling attacks target top executives
*
Phishing, privileges and passwords: Why identity is critical to improving cybersecurity posture
CIS
CIS Benchmarks Update November 2025
Wed, 19 Nov 2025 16:39:00 -0500
The November 2025 CIS Benchmarks monthly update highlights the CIS Benchmarks and CIS Build Kits that have been updated or recently released.
Malware Patrol
SecList
Following the digital trail: what happens to data stolen in a phishing attack
Kaspersky experts detail the journey of the victims' data after a phishing attack. We break down the use of email-based phishing kits, Telegram bots, and customized administration panels.
MySonicWall
Critical Infrastructure
*
High Water Mark: CISA Shares Foundations for Effective Cybersecurity and Risk Management
*
From Farm to Table: Securing the Future of Agriculture with Innovative Technology
*
Iran's Cyber Playbook: What US Critical Infrastructure Needs to Be Doing Right Now
*
Security Leaders Discuss Cyberattack on American Airlines Subsidiary
*
Cyberattack Disrupts European Airports, Security Leaders Respond
*
Integrating Mass Notification with Video Surveillance in Airports
*
From Farm to Table: Securing the Future of Agriculture with Innovative Technology
*
Layered Secure Entrances Strengthen Warehouse and Supply Chain Security
*
How Air Travel Became Safer Through Cashless Service
Case Studies
*
The 2 am call: Preparing for a government cyberattack
*
Häfele recovers from ransomware attack with new SASE platform
*
Ride-hailing company, inDrive, uses new platform to prevent fraud
*
Transforming Higher Ed Safety and Efficiency with Cloud-Based Access Control
*
Pennsylvania School District Adopts AI-Driven Gun Detection Technology
*
Protecting 14 Campuses, All With Different Needs
Tools
Exploits
Last 20 Website Defacements - Zone-h
Press Play to hear the answer!
Advisories