Latest Cybersecurity News
View all →OpenAI Impacted by North Korea-Linked Axios Supply Chain Hack
OpenAI revealed on Friday that it’s one of many organizations affected by the recent Axios supply chain attack, which cybersecurity experts have attributed to North…
iPhone forensics expose Signal messages after app removal in U.S. case
iPhone forensics expose Signal messages after app removal in U.S. case Pierluigi Paganini April 13, 2026 An FBI case in Texas shows Signal messages can…
Seven IBM WebSphere Liberty flaws can be chained into full takeover
SSO endpoints are often internet-facing by design, researchers noted, turning the flaw into a remote entry point and making chaining with additional weaknesses possible. AdminCenter…
Cyber resilience moves beyond incident response as AI threats and third-party risks grow
Business and government leaders are being urged to fundamentally rethink how they measure cyber resilience, as the traditional focus on post-incident recovery, including how quickly…
Ransomware groups standardize double extortion and AI-assisted targeting, Cyfirma reports
New data from Cyfirma disclosed that ransomware activity in March reflects a continuation of the sector’s shift toward structured, repeatable extortion models, where encryption is…
From South Park to Curriculaville
Give it up for Jeff Gill, our very own Senior 2D Animator. Like everyone here at Huntress, Jeff is highly passionate and exceptionally talented. But…
APT37 Abuses Facebook, Telegram, and Tampered Installer in New Targeted Intrusion Attack
A North Korean state-sponsored threat group known as APT37 has launched a new targeted intrusion campaign using social media platforms, encrypted messaging apps, and a…
The Dumbest Hack of the Year Exposed a Very Real Problem
In the wee hours of the night last April, someone stopped at roughly 20 street intersections across Silicon Valley and launched an unprecedented cyberattack that…
VIPERTUNNEL Python Backdoor Hidden in Fake DLL, Obfuscated Loader Chain
Hackers are abusing a stealthy Python backdoor called VIPERTUNNEL, hiding it behind a fake DLL file and a multi‑stage obfuscated loader to quietly tunnel traffic out…