-
OpenAI rotates macOS certificates after downloading a compromised Axios version, urging users to update apps before revoked certificates are blocked in May 2026.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
North Korean hackers (UNC4736) posed as a trading firm for six months to infiltrate Drift Protocol, using social engineering tactics to steal $285M without suspicion.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
North Korean group UNC1069 targets Node.js maintainers using fake LinkedIn and Slack profiles to spread malware and compromise open source packages.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Researchers from FortiGuard Labs have uncovered a high-severity spying campaign targeting South Korean companies. Discover how North Korean…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
New research from LevelBlue reveals how a suspected North Korean operative landed a remote IT role to fund national weapons programmes.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Researchers at AllSecure have revealed how North Korean hackers from the Lazarus Group used a fake LinkedIn job interview and deepfake technology to target their CEO.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Lazarus Group is now using Medusa ransomware in attacks on healthcare and social services, signaling a move toward profit-focused cybercrime.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Amazon Security Chief explains how a subtle keyboard delay exposed a North Korean impostor. Read about the laptop farm scheme and how 110 milliseconds of lag ended a major corporate infiltration.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
North Korea’s Lazarus Group deploys a new BeaverTail variant to steal credentials and crypto using fake job lures, dev tools, and smart contracts.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶


