DOJ moves to seize $7.74M in crypto linked to North Korean IT Worker Scam
09
Jun
2025

DOJ moves to seize $7.74M in crypto linked to North Korean IT Worker Scam

DOJ moves to seize $7.74M in crypto linked to North Korean IT worker scam Pierluigi Paganini June 09, 2025 US…

Chinese hacker
09
Jun
2025

SentinelOne shares new details on China-linked breach attempt

SentinelOne has shared more details on an attempted supply chain attack by Chinese hackers through an IT services and logistics…

Developers Beware! 16 React Native Packages With Million of Download Compromised Overnight
09
Jun
2025

Developers Beware! 16 React Native Packages With Million of Download Compromised Overnight

A sophisticated supply chain attack has compromised 16 popular React Native packages with over one million combined weekly downloads, marking…

U.S. Targets $7.7M in Crypto Tied to North Korean IT Worker Scam
09
Jun
2025

U.S. Targets $7.7M in Crypto Tied to North Korean IT Worker Scam

On June 5, 2025, the United States Department of Justice (DOJ) filed a verified civil forfeiture complaint in the US…

Malicious npm Packages as Utilities Let Attackers Destroy Production Systems
09
Jun
2025

Malicious npm Packages as Utilities Let Attackers Destroy Production Systems

Security researchers have uncovered a disturbing new threat in the npm ecosystem where malicious packages masquerade as legitimate utilities while…

Meta Bypassed Privacy Protections to Track Android Users
09
Jun
2025

Meta Bypassed Privacy Protections to Track Android Users

A recent investigation by cybersecurity researchers has revealed that tech giants Meta (formerly Facebook) and Yandex have been exploiting a…

United Natural Foods Suffers Cyberattack
09
Jun
2025

United Natural Foods Suffers Cyberattack

Major grocery distributor takes systems offline following security breach, disrupting supply chain operations. United Natural Foods, Inc. (UNFI), one of…

Bitter Malware Employs Custom-Built Tools to Evade Detection in Advanced Attacks
09
Jun
2025

Bitter Malware Employs Custom-Built Tools to Evade Detection in Advanced Attacks

In a recent research by Proofpoint and Threatray has unveiled the intricate and evolving malware arsenal of the Bitter group,…

Limited Canva Creator Data Exposed Via AI Chatbot Database
09
Jun
2025

Limited Canva Creator Data Exposed Via AI Chatbot Database

A Chroma database operated by Russian AI chatbot startup My Jedai was found exposed online, leaking survey responses from over…

Over 70 Organizations Across Multiple Sectors Targeted by China-Linked Cyber Espionage Group
09
Jun
2025

Over 70 Organizations Across Multiple Sectors Targeted by China-Linked Cyber Espionage Group

Jun 09, 2025Ravie LakshmananGovernment Security / Cyber Espionage The reconnaissance activity targeting American cybersecurity company SentinelOne was part of a…

Gartner: How to create a compelling SOC narrative for executives
09
Jun
2025

Gartner: How to create a compelling SOC narrative for executives

Security operations center (SOC) leaders often struggle to provide useful security metrics to their executive audiences, such as board members…

FBI veteran Brett Leatherman to lead Cyber division
09
Jun
2025

FBI veteran Brett Leatherman to lead Cyber division

A familiar face is being promoted from within to lead the FBI’s Cyber division. In a LinkedIn post Sunday, Leatherman…