$ page 35/37

Iran's Pre-Positioned cyber arsenal: Six-Month infrastructure buildup reveals new threat model

Iranian state actors spent six months building resilient cyber infrastructure using US shell companies, designed to survive military retaliation durin

5 min readMar 19

Iran-Backed hackers target medical giant Stryker with devastating wiper attack

Iran-backed hackers deploy destructive wiper malware against medical giant Stryker, forcing evacuation of 5,000 Irish workers and threatening global h

5 min readMar 19

AI-Powered cyberattack on Mexican government agencies exposes new era of sophisticated threats

Mexican government agencies fell victim to AI-powered cyberattacks using ChatGPT and Claude, exposing citizen data and highlighting new era of AI-enabled threats.

4 min readMar 19

Nordstrom's email system exploited in sophisticated cryptocurrency scam campaign

Cybercriminals exploited Nordstrom's legitimate email infrastructure to send cryptocurrency scam messages disguised as St. Patrick's Day promotions.

4 min readMar 19

North korean apts weaponize AI to supercharge IT worker infiltration scams

North Korean APTs are using AI tools like deepfakes and automated communications to enhance IT worker infiltration scams, making them harder to detect.

4 min readMar 19

Tycoon 2FA phishing empire crumbles: Europol takes down MFA-Bypassing criminal platform

International law enforcement dismantles Tycoon 2FA, a sophisticated phishing platform that helped cybercriminals bypass multi-factor authentication protections.

5 min readMar 19

Trump administration's commercial spyware policy reversal sparks security and privacy concerns

Trump administration reverses commercial spyware restrictions, rescinding sanctions on vendors like NSO Group and creating uncertainty about surveilla

5 min readMar 19

Six new android malware families launch sophisticated assault on mobile banking and crypto security

Six sophisticated Android malware families target PIX payments, banking apps, and crypto wallets with advanced capabilities including real-time fraud and data theft.

4 min readMar 19

Chinese nexus actors pivot to Qatar targeting amid middle east tensions

Chinese state-sponsored hackers pivot to target Qatar amid Middle East tensions, demonstrating rapid operational agility in response to geopolitical events.

5 min readMar 18

AI assistants create new security blind spots as autonomous agents gain system access

Autonomous AI agents with system access create new security challenges, blurring lines between data and code while introducing novel attack vectors or

4 min readMar 18

Cisco patches 48 firewall vulnerabilities including two critical 10/10 CVSS flaws

Cisco patches 48 firewall vulnerabilities including two critical 10.0 CVSS flaws affecting edge security appliances, urging immediate updates.

2 min readMar 18

Iran's Cyber-Kinetic war doctrine takes shape: Hacking cameras to plan missile strikes

Iran integrates cyber operations with kinetic warfare by hacking IP cameras for missile strike reconnaissance, blurring traditional warfare boundaries.

6 min readMar 18