Arizona woman sentenced for aiding North Korea in U.S. IT job fraud scheme
26
Jul
2025

Arizona woman sentenced for aiding North Korea in U.S. IT job fraud scheme

Arizona woman sentenced for aiding North Korea in U.S. IT job fraud scheme Pierluigi Paganini July 26, 2025 Arizona woman…

Hackers Compromised Official Gaming Mouse Software to Deliver Windows-based Xred Malware
26
Jul
2025

Hackers Compromised Official Gaming Mouse Software to Deliver Windows-based Xred Malware

Gaming peripheral manufacturer Endgame Gear has confirmed that hackers successfully compromised its official software distribution system, using the company’s OP1w…

Microsoft Investigates Leak in Early Warning System Used by Chinese Hackers to Exploit SharePoint Vulnerabilities
26
Jul
2025

Microsoft Investigates Leak in Early Warning System Used by Chinese Hackers to Exploit SharePoint Vulnerabilities

Chinese laws requiring vulnerability disclosure to the government create transparency issues and potential conflicts for international cybersecurity efforts. Microsoft is…

Arizona Woman Sentenced for Aiding North Korean IT Workers in Cyber Operations
26
Jul
2025

Arizona Woman Sentenced for Aiding North Korean IT Workers in Cyber Operations

Christina Marie Chapman, a 50-year-old Arizona woman, has been sentenced to 102 months in prison for her role in an…

Microsoft Probes Leak in Early Alert System as Chinese Hackers Exploit SharePoint Vulnerabilities
26
Jul
2025

Microsoft Probes Leak in Early Alert System as Chinese Hackers Exploit SharePoint Vulnerabilities

Microsoft Corp. is investigating whether a leak from its Microsoft Active Protections Program (MAPP) enabled Chinese state-sponsored hackers to exploit…

VOIP-Based Botnet Attacking Routers Configured With Default Password
26
Jul
2025

VOIP-Based Botnet Attacking Routers Configured With Default Password

A sophisticated global botnet campaign targeting VOIP-enabled routers and devices configured with default credentials.  The discovery began when analysts noticed…

Dalfox 2.12 Released ⚡︎ | HAHWUL
26
Jul
2025

Search in Zola: Fuse.js vs. Elasticlunr.js

Comparing Fuse.js and Elasticlunr.js for Zola’s client-side search. Learn which library suits your static site’s needs. Zola is a fast…

Operation CargoTalon targets Russia’s aerospace with EAGLET malware,
26
Jul
2025

Operation CargoTalon targets Russia’s aerospace with EAGLET malware,

Operation CargoTalon targets Russia’s aerospace with EAGLET malware, Pierluigi Paganini July 25, 2025 Operation CargoTalon targets Russia’s aerospace and defense…

BreachForums Resurfaces on Original Dark Web (.onion) Address
26
Jul
2025

BreachForums Resurfaces on Original Dark Web (.onion) Address

The notorious cybercrime and hacker platform BreachForums has mysteriously resurfaced on its original dark web .onion domain. The site appears…

Unpatched flaw in EoL LG LNV5110R cameras lets hackers gain Admin access
26
Jul
2025

Unpatched flaw in EoL LG LNV5110R cameras lets hackers gain Admin access

Unpatched flaw in EoL LG LNV5110R cameras lets hackers gain Admin access Pierluigi Paganini July 25, 2025 Hundreds of LG…

Web-to-App Funnels: Pros And Cons
26
Jul
2025

Web-to-App Funnels: Pros And Cons

In today’s mobile-first world, companies often struggle to bridge the gap between their websites and mobile apps. This is where…

Artificial Intelligence
25
Jul
2025

Amazon AI coding agent hacked to inject data wiping commands

A hacker planted data wiping code in a version of Amazon’s generative AI-powered assistant, the Q Developer Extension for Visual Studio…