News
Axios Supply Chain Attack Exposes Malicious Npm Packages
2+ day, 17+ hour ago (354+ words) The attacker altered the account's registered email to a ProtonMail address and used the npm CLI to publish the compromised packages. This bypassed the cryptographic protection typically enforced by trusted publishing workflows, making the malicious releases appear legitimate at first…...
UAE Cyberattacks Surge As AI Fuels New Wave Of Threats
3+ day, 15+ hour ago (234+ words) The United Arab Emirates (UAE) is experiencing an unprecedented surge in cyberattacks, with recent regional tensions coinciding with a rise in digital threats powered by artificial intelligence. The country's Cyber Security Council has highlighted the scale and complexity of UAE…...
Black Friday Discounts Fail Transparency Test In EU Sweep
3+ day, 19+ hour ago (396+ words) A new investigation into Black Friday discounts across Europe has revealed a troubling pattern, many online deals may not be as genuine as they appear. According to findings released by the European Commission and consumer protection authorities, nearly one in…...
Smart Home Breach: What Happens After Matters Most
3+ day, 17+ hour ago (383+ words) Smart Home Breach: What Happens After Matters Most'The Cyber Express Modern households have started adopting internet-connected devices, ranging from cameras and speakers to locks and routers However, with this technological advancement, the risk of a smart home breach has grown…...
Energy Sector Ransomware Threats Surge In 2025
6+ day, 19+ hour ago (216+ words) In 2025 alone, the energy and utilities sector recorded 187 confirmed ransomware attacks. These were not mere'attempts,'but successful breaches involving system encryption, data theft, and ransom demands." The continued rise of'energy sector ransomware'attacks can be traced to structural weaknesses unique to…...
Google News
1+ week, 16+ hour ago (12+ words) Node.js Fixes CVE-2026-21637 and Critical Flaws Now'The Cyber Express...
Perseus Android Malware Hides In Streaming Apps
1+ week, 3+ day ago (668+ words) At a time when smartphones double as banking hubs, personal diaries, and authentication tools, the emergence of Perseus Android malware highlights a worrying shift: attackers are no longer just stealing passwords, they are studying users. The Perseus Android malware builds…...
The Cyber Express Weekly Roundup: Cyberattacks, AI Risks, and Geopolitical Cyber Threats
1+ week, 6+ day ago (328+ words) TCE Weekly Roundup: Global Warfare, AI Risks, and More'The Cyber Express In this week's cybersecurity roundup, The Cyber Express covers key global security developments, including a major supply chain disruption affecting a global manufacturer, rising concerns over security and legal…...
CRIL: Middle East Cyber Warfare Escalates Rapidly
2+ week, 1+ day ago (471+ words) Image created with Gemini The findings highlight how modern conflicts now extend beyond physical battlefields. As geopolitical tensions escalate, Middle East cyber warfare is emerging as a key front where cyber operations are used to disrupt services, influence public perception,…...
How Cortex XDR BIOC Rules Could Become an Attack Surface
2+ week, 1+ day ago (435+ words) A new study focusing on Cortex XDR BIOC rules reveals that encrypted detection logic, designed to remain secure, can be decrypted and examined, creating new risks for organizations relying on endpoint detection technologies." This research highlights an often-overlooked reality in…...