[ad_1] Summary On April 26, 2026, the ransomware group TheGentlemen claimed responsibility for a cyberattack againstLawson Software (Thailand) Co., Ltd. (lawson.co.th), a prominent IT consulting firm based in Bangkok, Thailand.The group has threatened to leak sensitive company data unless their demands are met. Incident Report Field Details Target Lawson Software (Thailand) Co., Ltd. Domain lawson.co.th...
Read More
[ad_1] The momentum behind a social media ban for Canadian minors has been building for months. The federal Liberals voted at their April policy convention to back a minimum age of 16 for social media accounts and AI chatbots, the government’s expert panel on online safety is studying the issue, protesters have now rallied on...
Read More
[ad_1] Key Takeaways Check Point Research discovers that the VECT 2.0 ransomware permanently destroys “large files” rather than encrypting them. A critical flaw in the encryption implementation, identical across all three platform variants (Windows, Linux, ESXi), discards three of four decryption nonces for every file above 131,072 bytes (128 KB). Full recovery is impossible for...
Read More
[ad_1] Colorado-based defence aerospace unicorn True Anomaly has raised $650 million in a Series D funding round, lifting its valuation to $2.2 billion as it ramps up hiring, manufacturing and spacecraft deployment. The raise brings the company’s total capital secured since its 2022 launch to $1 billion. The round was co-led by Eclipse and Riot...
Read More
[ad_1] Berenberg’s fresh coverage of Palo Alto Networks (PANW), combined with its recent Koi acquisition and new AI focused security offerings, has put the stock back in focus for investors watching cybersecurity and agentic AI trends. See our latest analysis for Palo Alto Networks. That backdrop has coincided with a strong 30-day share price return...
Read More
[ad_1] The combined solution redefines Identity Security and access control for the AI era with the first autonomous Identity Security platform that uses AI at runtime to determine and enforce what each human, machine and agentic identity can access, and when. Security in the AI era demands runtime, context-driven decisions. Static rules can’t keep up....
Read More
[ad_1] When cybercrime operations are disrupted, the cause is typically not due to sophisticated detection, but rather basic operational mistakes such as identity reuse, weak infrastructure separation, or overlooked metadata. In a recent cybercrime forum post observed and analyzed by Flare researchers, a threat actor attempts to address these failures by outlining a structured OPSEC...
Read More
[ad_1] 2026-04-28T12:45:04+00:00 font Enable Reading Mode A- A A+ Shafaq News- Middle East Iran-linked hacking group Handala (Hanzala) on Tuesday leaked personal data of 2,379 US Marines deployed in the Middle East and issued threats against American service members. On a Telegram channel, Handala published names and personal details of Marines stationed in the Persian...
Read More
[ad_1] NEW YORK, April 28, 2026 /PRNewswire/ — CISOs Connect today announced the opening of nominations for the 2026 A100: CISOs Top 100 Accelerated CISOs Awards (A100), recognizing CISOs who are driving meaningful impact within their organizations and across the security community. The A100 Awards highlight CISOs who demonstrate effective leadership and the ability to...
Read More
[ad_1] Summary On April 26, 2026, the notorious ransomware group Qilin announced their involvement in a cyberattack against Istarpal (www.istarpal.com), a leading entity in Singapore’s education sector. The group threatens to disclose sensitive data unless the organization engages in negotiations. Incident Report Field Details Target Istarpal Domain www.istarpal.com Country Singapore Attacking Group Qilin Date Reported...
Read More
1 9 10 11 12 13 22
National Cyber Security

FREE
VIEW