Security and Cloud
BACK TO MAGAZINECATALOGUE SECTION

Security and Cloud

Infrastructure and security for the modern enterprise.

Latest Intelligence in Security and Cloud

6 REPORTS FOUND
The Polite Spy: How a Fake Email Address Siphoned U.S. Military Secrets for Years

The Polite Spy: How a Fake Email Address Siphoned U.S. Military Secrets for Years

We often imagine international espionage as a high-stakes thriller filled with zero-day exploits, sophisticated malware, and shadowy hackers in hoodies.

Beyond the Breach: Why Spectrum Security’s $19M Launch is a Wake-Up Call for CISOs

Beyond the Breach: Why Spectrum Security’s $19M Launch is a Wake-Up Call for CISOs

Every Chief Information Security Officer (CISO) has lived through the same nightmare: a post-mortem meeting where the forensic team reveals a breach happened because of a tiny oversight.

Adobe Patches Actively Exploited Acrobat Reader Flaw CVE-2026-34621 as Zero-Day Attacks Spread

Adobe Patches Actively Exploited Acrobat Reader Flaw CVE-2026-34621 as Zero-Day Attacks Spread

Adobe has rushed out emergency security updates after discovering that a critical vulnerability in Acrobat Reader is already being actively exploited in real-world attacks. The flaw, tracked as CVE-2026-34621, has raised serious concerns due to its ability to enable remote code execution—effectively allowing attackers to take control of affected systems. With a CVSS severity score […]

OpenAI Revokes macOS App Certificate After Axios Supply Chain Attack Exposes Growing Open-Source Security Risks

OpenAI Revokes macOS App Certificate After Axios Supply Chain Attack Exposes Growing Open-Source Security Risks

A major software supply chain security scare has forced OpenAI to revoke and rotate its macOS app certificate after a malicious version of the widely used Axios library was introduced through a compromised GitHub Actions workflow. While no user data or internal systems were reportedly impacted, the incident highlights how fragile modern software pipelines have […]

CISA Flags 6 Actively Exploited Vulnerabilities in Microsoft, Fortinet, and Adobe Software

CISA Flags 6 Actively Exploited Vulnerabilities in Microsoft, Fortinet, and Adobe Software

Another week, another reminder that unpatched software is still one of the easiest ways into your systems. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added six new vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog, confirming that these flaws are already being used in real-world cyberattacks. The affected software spans major enterprise tools, […]

108 Malicious Chrome Extensions Caught Stealing Google & Telegram Data — What You Need to Know

108 Malicious Chrome Extensions Caught Stealing Google & Telegram Data — What You Need to Know

What looks like a harmless browser add-on could be quietly spying on you. Cybersecurity researchers have uncovered a large-scale campaign involving 108 malicious Google Chrome extensions that have collectively affected over 20,000 users. Disguised as everyday tools — from Telegram helpers to gaming add-ons — these extensions are secretly stealing sensitive user data, hijacking browser […]

EXPAND YOUR SCOPE

Other Domains of Intelligence