Skip to content

Supply Chain Security

Conduent Data Breach (Impacting Volvo Group North America)

Date of Incident: October 21, 2024 – January 13, 2025 Overview: The Conduent Data Breach, impacting Volvo Group North America, occurred between October 21, 2024, and January 13, 2025, and was reported on February 10, 2026. This breach exposed personal details of nearly 17,000 customers and staff, including full names, Social Security Numbers, dates of… Read More »Conduent Data Breach (Impacting Volvo Group North America)

Weekly Report: New Hacking Techniques and Critical CVEs 3 Feb- 9 Feb 2026

The week of February 3–9, 2026 saw threat actors increasingly abusing trusted platforms-cloud workloads, Linux‑on‑Windows via WSL, and enterprise‑grade ITSM appliances-to execute stealthy, AI‑accelerated operations. This report highlights four critical CVEs, two new offensive techniques, one national‑level breach, and key darkweb chatter that directly impact modern attack‑surface planning. >>Outpace Attackers With AI-Based Automated Penetration Testing… Read More »Weekly Report: New Hacking Techniques and Critical CVEs 3 Feb- 9 Feb 2026

Weekly Cybersecurity Intelligence Report Cyber Threats & Breaches 27 Jan – 2 Feb 2026

This week saw three critical attack vectors converge: network perimeter takeover via Fortinet CVE-2026-24858, state-sponsored Office zero-day exploitation by APT28, and antivirus supply chain compromise through eScan’s update infrastructure. Attackers demonstrated unprecedented speed—weaponizing fresh vulnerabilities within 72 hours and leveraging trusted security software distribution channels for malware delivery. Key Metrics: 3 critical vulnerabilities actively exploited… Read More »Weekly Cybersecurity Intelligence Report Cyber Threats & Breaches 27 Jan – 2 Feb 2026

Panel Brief | Top Breaches in Cyber Security in 2025

Executive Summary By the end of 2025, one reality became impossible to ignore: the barrier to executing high-impact cyberattacks has collapsed. The most damaging breaches of the year were not driven by novel zero-days or exotic techniques. Instead, they reflected something more concerning-capabilities once limited to nation-state or elite criminal groups are now widely accessible.… Read More »Panel Brief | Top Breaches in Cyber Security in 2025

Weekly Report: New Hacking Techniques and Critical CVEs 20 Jan – 26 Jan 2026

Three actively exploited zero-days, two CVSS 10.0 flaws, and critical supply chain compromises. Threat activity spans infrastructure (Cisco, Microsoft, Fortinet), AI/DevOps platforms (n8n, Chainlit, Zoom), and legacy systems. Dominant pattern: improper input validation enabling unauthenticated infrastructure takeover. Key Metrics: 3 zero-days exploited | 2 CVSS 10.0 flaws | 509 GB (ASRock Rack) + 861 GB… Read More »Weekly Report: New Hacking Techniques and Critical CVEs 20 Jan – 26 Jan 2026