-
UNC6783 hackers and extortionists impersonate support staff, using fake Okta login pages and social engineering to access corporate systems and steal sensitive data.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Microsoft researchers have uncovered a fast-moving group, Storm-1175, launching high-speed Medusa ransomware attacks against healthcare and education sectors in the UK, US, and Australia by exploiting security flaws in as little as 24 hours.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
North Korean hackers (UNC4736) posed as a trading firm for six months to infiltrate Drift Protocol, using social engineering tactics to steal $285M without suspicion.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
North Korean group UNC1069 targets Node.js maintainers using fake LinkedIn and Slack profiles to spread malware and compromise open source packages.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Researchers from FortiGuard Labs have uncovered a high-severity spying campaign targeting South Korean companies. Discover how North Korean…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Team Cymru details the Yurei ransomware campaign, using standard tools and a few Stranger Things–named payloads to breach and encrypt systems.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
New research from Seqrite explains the ‘dual-use dilemma,’ where ransomware attackers repurpose legitimate IT tools like IOBit Unlocker…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Telnyx issues an urgent alert after hackers TeamPCP uploaded malicious versions (4.87.1 & 4.87.2) of its Python SDK to steal cloud and crypto credentials.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Mirai malware evolves into hundreds of variants, driving botnet growth, including Aisuru and KimWolf, powering large-scale attacks, and increasing risks to vulnerable IoT devices worldwide.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Hackers compromised Trivy, Checkmarx, and LiteLLM in a supply chain attack, stealing cloud credentials, tokens, and crypto wallet data from developers.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶


