“Cyber warfare is as much about psychological strategy as technical prowess.”
― James Scott
-
DPRK Hackers Steal $137M from TRON Users in Single-Day Phishing Attack [email protected] (The Hacker News)
Multiple threat activity clusters with ties to North Korea (aka Democratic People’s Republic of Korea or DPRK) have been linked to attacks targeting organizations and individuals in the Web3 and cryptocurrency space. “The focus on Web3 and cryptocurrency appears to be primarily financially motivated due to the heavy sanctions that have been placed on North…
-
Iran-Linked Hackers Target Israel with MURKYTOUR Malware via Fake Job Campaign [email protected] (The Hacker News)
The Iran-nexus threat actor known as UNC2428 has been observed delivering a backdoor known as MURKYTOUR as part of a job-themed social engineering campaign aimed at Israel in October 2024. Google-owned Mandiant described UNC2428 as a threat actor aligned with Iran that engages in cyber espionage-related operations. The intrusion set is said to have distributed…
-
Android Spyware Disguised as Alpine Quest App Targets Russian Military Devices [email protected] (The Hacker News)
Cybersecurity researchers have revealed that Russian military personnel are the target of a new malicious campaign that distributes Android spyware under the guise of the Alpine Quest mapping software. “The attackers hide this trojan inside modified Alpine Quest mapping software and distribute it in various ways, including through one of the Russian Android app catalogs,”…
-
Three Reasons Why the Browser is Best for Stopping Phishing Attacks [email protected] (The Hacker News)
Phishing attacks remain a huge challenge for organizations in 2025. In fact, with attackers increasingly leveraging identity-based techniques over software exploits, phishing arguably poses a bigger threat than ever before. Attackers are increasingly leveraging identity-based techniques over software exploits, with phishing and stolen credentials (a byproduct of phishing) now the primaryRead More
-
Russian Hackers Exploit Microsoft OAuth to Target Ukraine Allies via Signal and WhatsApp [email protected] (The Hacker News)
Multiple suspected Russia-linked threat actors are “aggressively” targeting individuals and organizations with ties to Ukraine and human rights with an aim to gain unauthorized access to Microsoft 365 accounts since early March 2025. The highly targeted social engineering operations, per Volexity, are a shift from previously documented attacks that leveraged a technique known as device…
-
Ripple’s xrpl.js npm Package Backdoored to Steal Private Keys in Major Supply Chain Attack [email protected] (The Hacker News)
The Ripple cryptocurrency npm JavaScript library named xrpl.js has been compromised by unknown threat actors as part of a software supply chain attack designed to harvest and exfiltrate users’ private keys. The malicious activity has been found to affect five different versions of the package: 4.2.1, 4.2.2, 4.2.3, 4.2.4, and 2.14.2. The issue has been…
-
Google Drops Cookie Prompt in Chrome, Adds IP Protection to Incognito [email protected] (The Hacker News)
Google on Tuesday revealed that it will no longer offer a standalone prompt for third-party cookies in its Chrome browser as part of its Privacy Sandbox initiative. “We’ve made the decision to maintain our current approach to offering users third-party cookie choice in Chrome, and will not be rolling out a new standalone prompt for…
-
Explore the impact of quantum computing on cryptography
When quantum computers become more widely available, lots of encryption types will be vulnerable. Learn why, plus solutions and how to navigate a post-quantum cryptography world.Read More
-
What is ransomware? Definition and complete guide
Ransomware is malware that locks and encrypts a victim’s data, files, devices or systems, rendering them inaccessible and unusable until the attacker receives a ransom payment.Read More
-
Docker Malware Exploits Teneo Web3 Node to Earn Crypto via Fake Heartbeat Signals [email protected] (The Hacker News)
Cybersecurity researchers have detailed a malware campaign that’s targeting Docker environments with a previously undocumented technique to mine cryptocurrency. The activity cluster, per Darktrace and Cado Security, represents a shift from other cryptojacking campaigns that directly deploy miners like XMRig to illicitly profit off the compute resources. This involves deploying a malware strainRead More
“Security used to be an inconvenience sometimes, but now it’s a necessity all the time.”
― Martina Navratilova