Log4Shell exploited by criminals and intelligence services. Private sector offensive cyber capabilities. Noberus ransomware used in double-extortion attacks. Squid Game phishbait.

Previous articleMeta Acts Against 7 Entities Found Spying on 50,000 Users
Next articleBest cybersecurity schools and programs