Chinese Hacker Sentenced for Kill Switch Attack on Ohio Firm’s Global Network
A federal court has handed down a four-year prison term to a former software developer who sabotaged his employer’s global network with a custom “kill…
A federal court has handed down a four-year prison term to a former software developer who sabotaged his employer’s global network with a custom “kill…
The Italian Agency for Digitalization (Agid) has confirmed a large-scale cyberattack targeting hotel servers across Italy. Tens of thousands of high-resolution scans of identification documents,…
Threat actors continue to use Scheduled Tasks and other built-in Windows features to create persistence in the ever-changing world of cybersecurity threats, frequently avoiding the…
“AI isn’t coming, it’s already here. The question is, are you ready?” That’s the brutal reality of a rapidly AI-driven world. From small businesses automating daily tasks to enterprises using generative…
A Buffalo Police detective has been hit with a superseding federal indictment for allegedly attempting to purchase stolen credentials from an illicit online marketplace known…
Since early this year, RIA-Novosti has published roughly one story per week on UVB-76, suggesting its coded messages are related to missile strikes on Iran,…
Microsoft has acknowledged that the August 2025 security update—KB5063878—can cause significant performance degradation on both Windows 11, version 24H2, and supported Windows 10 releases. The…
Aug 25, 2025Ravie LakshmananMalware / Cyber Attack The advanced persistent threat (APT) actor known as Transparent Tribe has been observed targeting both Windows and BOSS…
Threat actors are increasingly abusing native evaluation and execution functions to conceal and execute malicious payloads within innocent-looking packages on PyPI. Security researchers warn that…
Pakistan-linked APT36 abuses Linux .desktop files to drop custom malware in new campaign Pierluigi Paganini August 25, 2025 APT36 uses Linux .desktop files in new…
A novel macOS infostealer malware, designated as Mac.c, has emerged as a formidable contender in the underground malware-as-a-service (MaaS) ecosystem. Developed openly by a threat…
Electronics manufacturer Data I/O took offline operational systems following a ransomware attack Pierluigi Paganini August 25, 2025 Electronics manufacturer Data I/O reports a ransomware attack…