Ukraine Hackers Claimed Cyberattack on Major Russian Drone Supplier
17
Jul
2025

Ukraine Hackers Claimed Cyberattack on Major Russian Drone Supplier

Last week, Ukraine’s Main Intelligence Directorate (GUR) orchestrated a sophisticated cyberattack against Gaskar Integration, a leading Russian drone manufacturer. The…

Massive Data Leak at Texas Adoption Agency Exposes 1.1 Million Records
17
Jul
2025

Massive Data Leak at Texas Adoption Agency Exposes 1.1 Million Records

“While scanning the web for exposed databases, cybersecurity researcher Jeremiah Fowler discovered a massive set of unprotected records linked to…

Chinese State-Sponsored Hackers Attacking Semiconductor Industry with Weaponized Cobalt Strike
17
Jul
2025

Chinese State-Sponsored Hackers Attacking Semiconductor Industry with Weaponized Cobalt Strike

A sophisticated Chinese state-sponsored cyber espionage campaign has emerged targeting Taiwan’s critical semiconductor industry, employing weaponized Cobalt Strike beacons and…

Hackers Use GitHub Repositories to Host Amadey Malware and Data Stealers, Bypassing Filters
17
Jul
2025

Hackers Use GitHub Repositories to Host Amadey Malware and Data Stealers, Bypassing Filters

Jul 17, 2025Ravie LakshmananMalware / Social Engineering Threat actors are leveraging public GitHub repositories to host malicious payloads and distribute…

Thousands of women in tech leave their roles each year
17
Jul
2025

Thousands of women in tech leave their roles each year

A lack of opportunity for progression is a main reason why women are leaving the technology sector, according to the…

AI hallucinations
17
Jul
2025

LameHug malware uses AI LLM to craft Windows data-theft commands in real-time

A novel malware family named LameHug is using a large language model (LLM) to generate commands to be executed on…

Hackers Exploiting Blind Spots in DNS Records to Store and Deliver Malware
17
Jul
2025

Hackers Exploiting Blind Spots in DNS Records to Store and Deliver Malware

A sophisticated new attack vector where malicious actors are hiding malware inside DNS records, exploiting a critical blind spot in…

UNG0002 Actors Weaponize LNK Files via ClickFix Fake CAPTCHA Pages
17
Jul
2025

UNG0002 Actors Weaponize LNK Files via ClickFix Fake CAPTCHA Pages

Cybersecurity researchers at Seqrite Labs have identified a sophisticated espionage group designated as UNG0002 (Unknown Group 0002) that has been…

UK government plans to ramp up sovereign computer capacity
17
Jul
2025

UK government plans to ramp up sovereign computer capacity

With the Bristol Isambard-AI supercomputer now live, the UK government has unveiled a roadmap to delivering 420 Exaflops of compute…

Researchers Uncover on How Hacktivist Groups Gaining Attention and Selecting Targets
17
Jul
2025

Researchers Uncover on How Hacktivist Groups Gaining Attention and Selecting Targets

The global hacktivist landscape has undergone a dramatic transformation since 2022, evolving from primarily ideologically motivated actors into a complex…

Chinese State-Sponsored Hackers Target Semiconductor Industry with Weaponized Cobalt Strike
17
Jul
2025

Chinese State-Sponsored Hackers Target Semiconductor Industry with Weaponized Cobalt Strike

Proofpoint Threat Research has identified a sophisticated multi-pronged cyberespionage campaign targeting Taiwan’s semiconductor industry between March and June 2025. Three…

Print Friendly, PDF & Email
17
Jul
2025

Cyber Chaos in the Digital Era

In recent months, some of the UK’s most recognisable retailers, including M&S, Co-op and North Face have found themselves in…