China linked UNC6384 targeted diplomats by hijacking web traffic
China linked UNC6384 targeted diplomats by hijacking web traffic Pierluigi Paganini August 27, 2025 The China-linked APT group UNC6384 targeted diplomats by hijacking web traffic…
China linked UNC6384 targeted diplomats by hijacking web traffic Pierluigi Paganini August 27, 2025 The China-linked APT group UNC6384 targeted diplomats by hijacking web traffic…
I clearly see the merits of both sides, similar to the end-to-end encryption discussion. The last few years have given me some clarity on where…
Cybersecurity researchers at Truesec have uncovered a sophisticated malware campaign distributing a weaponized PDF editor under the guise of “AppSuite PDF Editor.” This operation, which…
UNC6395 targets Salesloft in Drift OAuth token theft campaign Pierluigi Paganini August 28, 2025 Hackers breached Salesloft to steal OAuth/refresh tokens for Drift AI chat;…
Neovim command sequences visualization (click for full size) After returning to Neovim recently, I’ve discovered some powerful techniques for manipulating lines that have significantly improved…
Over the past year, a shadowy threat actor known as TAG-144—also tracked under aliases Blind Eagle and APT-C-36—has intensified operations against South American government institutions.…
A recent investigation has uncovered that relying solely on large language models (LLMs) to generate application code can introduce critical security vulnerabilities, according to a…
The Keeling Curve shows atmospheric CO2’s relentless rise (click for full size) In 1958, Charles David Keeling began measuring atmospheric carbon dioxide at the Mauna…
A newly disclosed vulnerability in the widely used ISC Kea DHCP server poses a significant security risk to network infrastructure worldwide. The flaw, designated CVE-2025-40779,…
The Cybersecurity and Infrastructure Security Agency (CISA) unveiled a comprehensive Cybersecurity Advisory (CSA) designed to empower network defenders to detect, hunt, and mitigate the activities…
The US, Japan and South Korea pledged to intensify efforts to block North Korea’s use of overseas IT workers to raise money for its weapons…
Microsoft Threat Intelligence has released a detailed report exposing a significant evolution in ransomware attacks, pioneered by the financially motivated threat actor Storm-0501. The group…