Press ENTER to search or ESC to close

// LATEST INTELLIGENCE

Jan. 31, 2026 | 2 min read

CERT Polska Uncovers Coordinated Cyber Onslaught Against Polish Renewable Energy Grid

CERT Polska has issued a critical report detailing a sophisticated, coordinated cyber campaign targeting over 30 wind and solar farms across Poland. This large-scale operation highlights the escalating threat to Operational Technology (OT) environments within the European Union's critical energy infrastructure. The attacks underscore the urgent need for enhanced segmentation and defense strategies against potential nation-state adversaries seeking grid disruption.

Jan. 31, 2026 | 3 min read

The Voice of Deception: Vishing Attacks Exploit MFA Weakness to Breach Enterprise SaaS Platforms

Mandiant researchers have uncovered a sophisticated vishing campaign utilizing social engineering tactics associated with the notorious ShinyHunters group. These attackers are impersonating IT or security teams to trick users into divulging their Multi-Factor Authentication (MFA) codes. The ultimate goal is to hijack user accounts and gain unauthorized access to critical enterprise SaaS environments.

Jan. 31, 2026 | 3 min read

Affiliate Fraud Meets AI Hijack: Malicious Chrome Extensions Target ChatGPT Users

Cybersecurity researchers have exposed a dangerous campaign leveraging malicious Chrome extensions that simultaneously engage in sophisticated affiliate link hijacking and unauthorized theft of ChatGPT session access. These extensions, disguised as legitimate tools, execute code injection to modify user behavior and compromise sensitive AI accounts, posing a significant risk to productivity and data integrity. Users are urged to immediately audit their installed extensions for unauthorized permissions and suspicious activity.

Jan. 31, 2026 | 3 min read

The End of an Era: Microsoft Commits to Disabling NTLM by Default in Future Windows Releases

Microsoft is signaling a major security shift, announcing plans to disable the decades-old NTLM authentication protocol by default in upcoming versions of Windows. This crucial move is designed to eliminate a pervasive attack surface exploited in sophisticated cyber campaigns, pushing organizations toward the vastly more secure Kerberos standard. While a necessary step for modern enterprise security, this change requires immediate auditing and migration planning for administrators running legacy applications or devices reliant on NTLM.