HackMyIP

網路安全資訊

來自頂級安全媒體的最新動態

2026-05-11The Hacker News
Purple Teaming Fails: Attackers Exploit CVEs in 10 Hours, Defenders Can't Keep Up

The cybersecurity industry’s beloved “purple team” concept is broken by design. According to data from CISA KEV, VulnCheck KEV, and ExploitDB, the mean time from ...

VulnerabilityThreat IntelIncident Response
Read More → Use Tool →
2026-05-10BleepingComputer
German Police Shut Down Relaunched Crimenetwork Marketplace, Arrest Admin

German law‑enforcement agencies, led by the Federal Criminal Police Office (BKA) and the Hessian State Criminal Police Office (LKA Hessen) in close coordination with Europol’s Euro...

PrivacyEncryptionThreat Intel
Read More → Use Tool →
2026-05-09BleepingComputer
JDownloader Site Hacked, Distributing Python RAT via Fake Installers

The official website for JDownloader, a widely used open‑source download manager, was compromised earlier this week. Attackers altered the download links for both Windows and Linux...

MalwareSupply ChainThreat Intel
Read More → Use Tool →
2026-05-08SecurityWeek
Train Hacker Arrested, PamDOORa Backdoor, New CISA Director Frontrunner

U.S. authorities have apprehended a suspect allegedly responsible for compromising rail signaling systems, marking a rare enforcement action against attacks on transportation netwo...

Threat IntelVulnerabilitySupply Chain
Read More → Use Tool →
2026-05-08SecurityWeek
Polish Agency Reports ICS Breaches at Five Water Treatment Plants

Poland's Computer Security Incident Response Team (CERT Polska) has disclosed a series of intrusion campaigns targeting Industrial Control Systems (ICS) at five municipal water tre...

VulnerabilityThreat Intel
Read More → Use Tool →
2026-05-08SecurityWeek
RansomHouse Ransomware Breach: Trellix Internal Services Exposed

RansomHouse, a known ransomware operation, has claimed responsibility for a breach at Trellix, a prominent cybersecurity vendor. The group posted several screenshots on a dark‑web ...

RansomwareData BreachThreat Intel
Read More → Use Tool →
2026-05-08The Record
Kingdom Market Admin Sentenced to 16 Years for Dark Web Drug Platform

A Slovakian national, Alan Bill, 33, was sentenced on Thursday to 16 years (192 months) in federal prison after pleading guilty to conspiracy to distribute controlled substances. B...

Threat IntelRegulation
Read More → Use Tool →
2026-05-08The Record
Pro-Ukraine BO Team, Head Mare Hackers Collaborate on Russian Attacks

Kaspersky researchers have uncovered a convergence between the pro‑Ukraine hacktivist group BO Team and the advanced threat actor Head Mare, revealing that the two have begun shari...

APTThreat IntelMalware
Read More → Use Tool →
2026-05-08The Hacker News
Patient Zero Webinar: Preventing Stealth Breaches Through Threat Intel

The Hacker News recently highlighted an emerging cybersecurity threat model dubbed "Patient Zero" that organizations increasingly struggle to detect. A specialized webinar hosted b...

PhishingThreat IntelData Breach
Read More → Use Tool →
2026-05-08The Hacker News
25M Alerts Expose Hidden Low-Severity Threat Gaps in Enterprise SOC

A recent analysis of more than 25 million security alerts collected from a dozen global security operations centers (SOCs) over a six‑month period reveals that low‑severity events ...

Threat IntelIncident ResponseVulnerability
Read More → Use Tool →
2026-05-08The Hacker News
Linux PamDOORa Backdoor Exploits PAM to Steal SSH Credentials

Cybersecurity researchers have disclosed a previously unknown Linux backdoor called PamDOORa that is being actively advertised on the Russian cybercrime forum Rehub for $1,600 by a...

MalwareThreat IntelAuthentication
Read More → Use Tool →
2026-05-08The Hacker News
Dirty Frag: New Linux Kernel Exploit Grants Root Access

Security researchers have disclosed a critical unpatched local privilege escalation (LPE) vulnerability in the Linux kernel, tracked as CVE-2026-3157, dubbed 'Dirty Frag.' The flaw...

Zero-DayVulnerabilityThreat Intel
Read More → Use Tool →
2026-05-08BleepingComputer
Why More Analysts Won’t Solve Your SOC Alert Problem

Modern threat actors launch campaigns that generate thousands of alerts per hour, leaving security operations centers (SOCs) drowning in data. Even with a larger team of analysts, ...

AI SecurityIncident ResponseThreat Intel
Read More → Use Tool →
2026-05-07The Hacker News
Ivanti EPMM CVE-2026-6973 RCE Under Active Exploitation – Admin Access

Ivanti has released a critical advisory warning of a high‑severity flaw in its Endpoint Manager Mobile (EPMM) product, tracked as CVE‑2026‑6973 and rated 7.2 on the CVSS scale. The...

VulnerabilityZero-DayThreat Intel
Read More → Use Tool →
2026-05-07The Hacker News
Day Zero Readiness: Closing Operational Gaps in Incident Response

Organizations often believe that securing a retainer with a reputable incident response (IR) firm or pre‑approving an external provider is sufficient to survive a cyber crisis. Whi...

Incident ResponseThreat IntelZero-Day
Read More → Use Tool →
2026-05-07BleepingComputer
Australia Warns of ClickFix Attacks Spreading Vidar Stealer

The Australian Cyber Security Centre (ACSC) has issued a high‑priority advisory warning that a sophisticated malware campaign is actively using the ClickFix social‑engineering tech...

MalwarePhishingThreat Intel
Read More → Use Tool →
2026-05-07Dark Reading
PCPJack Malware Exploits Parquet Files to Steal Cloud Secrets

Security researchers at Unit 42 have uncovered a new cloud‑targeting malware family they are calling PCPJack, which has quietly replaced the earlier TeamPCP implant. PCPJack distin...

MalwareCloud SecurityThreat Intel
Read More → Use Tool →
2026-05-07BleepingComputer
California Man Gets 6.5 Years for $230M Crypto Heist, Money Laundering

Ethan J. Rivera, a 20‑year‑old from Los Angeles, California, was sentenced on Friday to 78 months (6.5 years) in federal prison for his role in a sophisticated criminal operation t...

Threat IntelPrivacyEncryption
Read More → Use Tool →
2026-05-07Dark Reading
AI-Driven Cyberattack Targets SCADA Systems, Foiled by Login Screen

Security researchers at Mandiant and Dragos have documented what they are calling the world's first fully AI-integrated cyberattack campaign targeting operational technology (OT) i...

AI ThreatsVulnerabilityThreat Intel
Read More → Use Tool →
2026-05-06The Hacker News
New Mirai Botnet 'xlabs_v1' Exploits ADB for IoT DDoS Attacks

Cybersecurity researchers have identified a new Mirai-variant botnet designated as xlabs_v1 that actively exploits the Android Debug Bridge (ADB) interface to compromise internet-c...

MalwareVulnerabilityThreat Intel
Read More → Use Tool →
2026-05-06The Hacker News
Hacker News Opens Cybersecurity Stars Awards 2026 Submissions

The Hacker News (THN) has officially opened the call for entries for the Cybersecurity Stars Awards 2026, an initiative designed to shine a spotlight on the behind‑the‑scenes work ...

Bug BountyThreat IntelIncident Response
Read More → Use Tool →
2026-05-06BleepingComputer
Google Ads Abused in GoDaddy ManageWP Login Phishing Scam

A sophisticated phishing campaign is leveraging Google’s sponsored search ads to mimic the login page of ManageWP, GoDaddy’s platform for centrally managing large fleets of WordPre...

PhishingAuthenticationThreat Intel
Read More → Use Tool →
2026-05-06BleepingComputer
Ransomware Targets Backup Systems Before Encryption: Acronis

Acronis researchers have documented a systematic shift in ransomware operations: before triggering encryption, threat actors now deliberately cripple backup infrastructure. Their 2...

RansomwareIncident ResponseThreat Intel
Read More → Use Tool →
2026-05-06BleepingComputer
Webinar: Fix Triage, Enrichment & Coordination to Stop Incident Escalation

hackmyip.com will host a live webinar titled "Why Network Incidents Escalate and How to Fix Response Gaps" on March 15, 2025 at 2:00 PM EST. The session will feature Alex Rivera, s...

Incident ResponseThreat Intel
Read More → Use Tool →
2026-05-05The Hacker News
China-Linked UAT-8302 Hits South America Governments with Shared APT Malware

Security researchers have linked a newly tracked China‑nexus threat cluster, designated UAT‑8302, to a wave of cyber‑espionage operations targeting government agencies in South Ame...

APTMalwareThreat Intel
Read More → Use Tool →
2026-05-05The Hacker News
Microsoft Exposes Credential Theft Phishing Targeting 35K Users in 26 Countries

Microsoft’s Threat Intelligence Center (MSTIC) has released details of a large‑scale credential‑harvesting operation that successfully targeted roughly 35,000 users in 26 countries...

PhishingThreat IntelAPT
Read More → Use Tool →
2026-05-05Dark Reading
Trellix Source Code Breach Exposes Security Product Vulnerabilities

Trellix, a prominent cybersecurity company formed from the merger of McAfee Enterprise and FireEye, has confirmed a significant source code breach affecting multiple security produ...

Supply ChainData BreachThreat Intel
Read More → Use Tool →
2026-05-05Dark Reading
Berkeley CLTC Provides Cybersecurity Tools for Under-Resourced Entities

The UC Berkeley Center for Long-Term Cybersecurity (CLTC) has launched a dedicated research hub designed to bridge the cybersecurity gap for schools, local governments, and non‑pro...

Threat IntelIncident ResponseVulnerability
Read More → Use Tool →
2026-05-05Dark Reading
USB Pen Test: Steve Stasiukonis' Viral Social Engineering Experiment

In 2004, penetration tester Steve Stasiukonis of the security firm “SecureX” conducted a USB drop experiment at a regional credit union in the Pacific Northwest. Armed with a batch...

VulnerabilityPhishingThreat Intel
Read More → Use Tool →
2026-05-05BleepingComputer
Instructure Breach: Hacker Claims 280M Records from 8,800 Schools

Education technology provider Instructure has disclosed a significant data breach after a threat actor operating under the alias 'CSAMKing' claimed to have stolen approximately 280...

Data BreachPrivacyThreat Intel
Read More → Use Tool →
2026-05-05BleepingComputer
DAEMON Tools Backdoor Attack: Supply Chain Compromise

On April 8, 2026, Disc Soft Ltd. confirmed that the official DAEMON Tools Pro installer (version 8.0.0.0634) had been trojanized and was being distributed through its website. The ...

Supply ChainMalwareThreat Intel
Read More → Use Tool →
2026-05-05BleepingComputer
Student Arrested for Hacking Taiwan High-Speed Rail, Triggering Emergency Brakes

On 12 March 2026, Taiwanese authorities arrested a 23‑year‑old university student for allegedly compromising the TETRA (Terrestrial Trunked Radio) communication network that underp...

VulnerabilityIncident ResponseThreat Intel
Read More → Use Tool →
2026-05-05BleepingComputer
Latvian Gets 8.5 Years for Karakurt Ransomware Negotiator Role

A Latvian national was sentenced on Friday to 8.5 years in a U.S. federal prison after being extradited to face charges related to his work as a "cold case" negotiator for the Russ...

RansomwareThreat Intel
Read More → Use Tool →
2026-05-04The Hacker News
Global Police Bust: 276 Arrested, 9 Crypto Scam Centers Dismantled, $701M Seized

An international law enforcement coalition dubbed 'Operation Crypto Shield,' led by the FBI, Europol, and China's Ministry of Public Security, has achieved a landmark victory again...

PhishingThreat IntelIncident Response
Read More → Use Tool →
2026-05-04Dark Reading
Cybercriminal Syndicates Exploit Supply Chain to Boost Physical Cargo Theft

Physical cargo theft is no longer the domain of opportunistic street gangs; it has morphed into a high‑tech enterprise orchestrated by transnational cybercriminal syndicates. Accor...

Supply ChainAPTThreat Intel
Read More → Use Tool →
2026-05-04Dark Reading
RMM Tools Exploited in Stealthy Phishing Campaign Targeting 80+ Orgs

Security researchers at Volexity have uncovered a sophisticated phishing campaign leveraging legitimate remote monitoring and management (RMM) tools to maintain persistent access w...

PhishingMalwareThreat Intel
Read More → Use Tool →
2026-05-04Dark Reading
How Dark Reading Launched Cybersecurity Media Without Print in 2006

Twenty years ago, Dark Reading entered the cybersecurity media landscape without the traditional safety net of a print edition, proving that compelling content and editorial expert...

Threat Intel
Read More → Use Tool →
2026-05-04BleepingComputer
Zero-Day CVE-2026-22679 in Weaver E-Cology Exploited Since March

Security researchers have identified a critical remote‑code‑execution flaw in Weaver E‑cology, a widely deployed office‑automation platform. The vulnerability, tracked as CVE‑2026‑...

Zero-DayVulnerabilityThreat Intel
Read More → Use Tool →
2026-05-04BleepingComputer
Kaspersky: Amazon SES Phishing Evades Email Security

Kaspersky researchers identified a surge in phishing campaigns leveraging Amazon Simple Email Service (SES). Attackers abuse the trusted infrastructure by sending emails via verifi...

PhishingCloud SecurityThreat Intel
Read More → Use Tool →
2026-05-04BleepingComputer
Trellix Data Breach Exposes Source Code - What You Need to Know

Cybersecurity firm Trellix has disclosed a significant data breach after threat actors gained unauthorized access to a portion of its source code repository. The incident, discover...

Data BreachSupply ChainThreat Intel
Read More → Use Tool →
2026-05-04BleepingComputer
Amazon SES Phishing Surge: Evading Standard Security Filters

Amazon Simple Email Service (SES), the cloud‑based email sending platform offered by Amazon Web Services, is increasingly being weaponized by threat actors to distribute phishing e...

PhishingCloud SecurityThreat Intel
Read More → Use Tool →
2026-05-04BleepingComputer
Credit Union Loan Fraud: Stolen Identity Verification Exposed

Fraudsters are not breaking into credit unions with zero‑days or ransomware; they are exploiting the normal loan origination workflow. Flare’s threat‑intelligence team uncovered a ...

AuthenticationThreat IntelPrivacy
Read More → Use Tool →
2026-05-04BleepingComputer
CISA Warns: Copy Fail Linux Flaw Exploited for Root Access

CISA warned Monday that threat actors have begun actively exploiting a newly disclosed Linux kernel vulnerability dubbed “Copy Fail,” just one day after Theori security researchers...

VulnerabilityZero-DayThreat Intel
Read More → Use Tool →
2026-05-03BleepingComputer
Instructure Data Breach: ShinyHunters Claim 4.5M Records Stolen

Instructure, the educational technology company behind the popular Canvas learning‑management system, confirmed on March 5 2026 that unauthorized actors had accessed its internal n...

Data BreachThreat IntelPrivacy
Read More → Use Tool →
2026-05-02BleepingComputer
ConsentFix v3: Automated OAuth Abuse Targets Azure

Security researchers have flagged a new iteration of the consent‑phishing tool known as ConsentFix, now labeled v3, which dramatically expands the scale and automation of attacks a...

Cloud SecurityAuthenticationThreat Intel
Read More → Use Tool →
2026-05-01The Hacker News
Vishing & SSO Abuse Power Rapid SaaS Extortion Attacks

Cybersecurity researchers have identified two distinct cybercrime groups orchestrating rapid, high‑impact extortion campaigns that operate almost entirely within Software‑as‑a‑Serv...

PhishingCloud SecurityThreat Intel
Read More → Use Tool →
2026-05-01The Hacker News
China-Linked Hackers Target Asian Governments, NATO State, Activists

Cybersecurity researchers have uncovered a sophisticated espionage operation linked to Chinese state actors, targeting a broad spectrum of victims across Asia and a NATO member sta...

APTThreat IntelMalware
Read More → Use Tool →
2026-05-01The Hacker News
Top 5 Sales Challenges Costing MSPs Cybersecurity Revenue

Managed security services are on a steep ascent, with the market expected to swell from $38.31 billion in 2025 to $69.16 billion by 2030, making cybersecurity the fastest‑growing s...

Cloud SecurityThreat Intel
Read More → Use Tool →
2026-05-01Dark Reading
North Korean APTs Dominate 2026 Crypto Theft, AI in the Mix

North Korean advanced persistent threat (APT) groups have consolidated their dominance over the cryptocurrency threat landscape in 2026, accounting for an estimated 76 % of all dig...

APTAI ThreatsThreat Intel
Read More → Use Tool →
2026-05-01Dark Reading
Dark Reading Celebrates 20 Years of Cybersecurity Coverage

Dark Reading marks its 20th anniversary this month, reflecting on two decades of delivering timely cybersecurity news, analysis, and insights to professionals worldwide. Launched o...

Threat IntelPrivacyRegulation
Read More → Use Tool →
2026-05-01BleepingComputer
Criminal IP and Securonix ThreatQ Team Up to Boost Threat Intel

Criminal IP, a provider of exposure‑based threat intelligence, announced a partnership with Securonix to embed its rich contextual data directly into the Securonix ThreatQ platform...

Threat IntelIncident Response
Read More → Use Tool →
2026-05-01BleepingComputer
Former Employees Sentenced 4 Years for BlackCat Ransomware Attacks

A federal court has sentenced two former cybersecurity incident response professionals to four years in prison each for their roles in conducting BlackCat (ALPHV) ransomware attack...

RansomwareIncident ResponseThreat Intel
Read More → Use Tool →
2026-04-30The Hacker News
DEEP#DOOR Python Backdoor Steals Browser and Cloud Credentials

Security researchers at SentinelOne and WithSecure have uncovered a sophisticated Python-based backdoor named DEEP#DOOR that leverages legitimate tunneling services to establish co...

MalwareCloud SecurityThreat Intel
Read More → Use Tool →
2026-04-30KrebsOnSecurity
Brazilian Anti-DDoS Firm Exposed as Botnet Operator

A Brazilian technology firm that markets itself as a specialist in mitigating distributed denial-of-service (DDoS) attacks has been uncovered as the operator of a botnet responsibl...

Supply ChainThreat IntelMalware
Read More → Use Tool →
2026-04-29The Hacker News
SAP npm Packages Compromised in Credential-Stealing Supply Chain Attack

Cybersecurity researchers at Aikido Security have uncovered a new supply chain attack campaign that has compromised several npm packages associated with SAP software. The malicious...

Supply ChainMalwareThreat Intel
Read More → Use Tool →
2026-04-29The Hacker News
AI-Powered Kill Chain Automation Shifts Threat Landscape in 2026

In February 2026, a joint research team from SentinelLabs and the University of Calgary published a report revealing a paradigm shift in cyber‑attack tradecraft. The analysts, led ...

AI ThreatsAI SecurityThreat Intel
Read More → Use Tool →
2026-04-29The Hacker News
Exposure Management Platforms: Key Features and Common Pitfalls

Security teams across industries are increasingly discovering that traditional vulnerability management approaches fail to accurately represent organizational risk. Despite closing...

VulnerabilityThreat IntelCloud Security
Read More → Use Tool →
2026-04-29The Hacker News
CISA Adds Actively Exploited ConnectWise and Windows Flaws to KEV

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added two critical security flaws—one affecting ConnectWise ScreenConnect and the other targeting Microsoft Win...

VulnerabilityZero-DayThreat Intel
Read More → Use Tool →
2026-04-28Dark Reading
Chris Inglis Reflects on NSA Failures 13 Years After Snowden Leaks

Chris Inglis, who served as NSA Deputy Director from 2011 to 2014 under Director Keith Alexander, has broken his silence on the agency's missteps during the Edward Snowden affair, ...

PrivacyThreat IntelRegulation
Read More → Use Tool →
2026-04-28Dark Reading
Feuding Ransomware Groups 0APT and KryBit Expose Each Other's Operations

The ransomware ecosystem was rocked in early 2026 when two prominent ransomware‑as‑a‑service (RaaS) operations, 0APT and KryBit, turned on each other, spilling a treasure trove of ...

RansomwareAPTThreat Intel
Read More → Use Tool →
2026-04-28Dark Reading
Vidar Infostealer Dominates Market After Law Enforcement Takedowns

Vidar has emerged as the dominant infostealer in the cybercriminal ecosystem, filling the vacuum left by last year's coordinated law enforcement operations against Lumma Stealer an...

MalwareThreat IntelData Breach
Read More → Use Tool →
2026-04-28The Hacker News
Brazilian LofyGang Returns with Minecraft LofyStealer Campaign

After a three‑year absence, the Brazilian cybercrime group LofyGang has resurfaced with a new campaign targeting Minecraft players. The outfit is deploying a freshly coded stealer ...

MalwareThreat Intel
Read More → Use Tool →
2026-04-28The Hacker News
China's Silk Typhoon Hacker Extradited to US Over COVID Research Cyberattacks

A Chinese national linked to the Silk Typhoon advanced persistent threat (APT) group has been handed over to U.S. authorities after being arrested in Italy in July 2025. Xu Zewei, ...

APTThreat IntelIncident Response
Read More → Use Tool →
2026-04-27Dark Reading
Fast16: 20-Year-Old Malware That Predates Stuxnet Found

Researchers at SentinelOne, led by senior threat analyst Alexei Markov, uncovered a previously unknown malware framework they have dubbed "Fast16", dating back to the late 1990s an...

MalwareAPTThreat Intel
Read More → Use Tool →
2026-04-27The Hacker News
Checkmarx Data Leaked on Dark Web After Supply Chain Attack

Checkmarx has confirmed that the data stolen during the March 23 supply‑chain intrusion has been publicly posted on a Tor‑based dark‑web leak site. The company’s incident response ...

Supply ChainData BreachThreat Intel
Read More → Use Tool →
2026-04-27The Hacker News
PhantomCore Exploits TrueConf Flaws to Target Russian Networks

A pro‑Ukrainian hacktivist collective known as PhantomCore has been conducting aggressive intrusions against Russian organizations since September 2025, focusing on servers that ru...

VulnerabilityAPTThreat Intel
Read More → Use Tool →
2026-04-27The Hacker News
73 Fake VS Code Extensions Spread GlassWorm v2 Malware

Security researchers have identified 73 malicious Visual Studio Code extensions hosted on the Open VSX registry that are distributing an updated variant of the GlassWorm informatio...

MalwareSupply ChainThreat Intel
Read More → Use Tool →
2026-04-27The Hacker News
Fake CAPTCHA IRSF Scam: 120 Keitaro Campaigns Fuel Global SMS and Crypto Fraud

Security researchers at Group-IB have uncovered a large-scale smishing operation that combines fake CAPTCHA verification pages with International Revenue Share Fraud (IRSF) and cry...

PhishingThreat IntelPrivacy
Read More → Use Tool →
2026-04-25The Hacker News
CISA Adds 4 Exploited Flaws to KEV, Sets May 2026 Federal Deadline

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added four actively exploited vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog, signaling a...

VulnerabilityRegulationThreat Intel
Read More → Use Tool →
2026-04-24Dark Reading
US Charges 29 in Myanmar Investment Fraud Ring, Seizes 500+ Domains

The US Department of Justice has announced the indictment of 29 individuals linked to a cyber fraud syndicate operating from Myanmar, charging them with conspiracy to commit wire f...

PhishingThreat IntelPrivacy
Read More → Use Tool →
2026-04-24Dark Reading
AI Phishing Surges: Hackers Shift to 1-to-1 Personalized Attacks

In the past six months, a surge of AI‑powered phishing campaigns has reshaped the threat landscape, according to an analysis published by Dark Reading. Threat actors are moving awa...

PhishingAI ThreatsThreat Intel
Read More → Use Tool →
2026-04-24Dark Reading
Tropic Trooper APT Targets Home Routers and Japanese Entities

Tropic Trooper, the Chinese state‑sponsored threat group also tracked as KeyBoy and Pirate Panda, has broadened its operational scope with a fresh wave of attacks aimed at consumer...

APTVulnerabilityThreat Intel
Read More → Use Tool →
2026-04-23Dark Reading
China-Backed Hackers Industrializing Botnets for Covert Attacks

China's state-sponsored threat actors are increasingly leveraging automated botnets comprised of compromised IoT devices, routers, and servers to conduct large-scale cyber operatio...

APTMalwareThreat Intel
Read More → Use Tool →
2026-04-23Dark Reading
Africa Cyberattack Volume Falls 22% as Hackers Target Latin America

According to the latest Dark Reading analysis, the weekly number of cyberattacks directed at African organizations dropped by 22 % over the past year, falling from roughly 5,400 in...

Threat IntelAPTRansomware
Read More → Use Tool →
2026-04-23The Hacker News
China-Linked GopherWhisper Infiltrates 12 Mongolian Gov Systems

A previously undocumented China‑aligned advanced persistent threat (APT) group, tracked as GopherWhisper, has successfully compromised at least twelve Mongolian government institut...

APTMalwareThreat Intel
Read More → Use Tool →
2026-04-22Dark Reading
The Gentlemen Ransomware Gang Surges in Sophistication and Speed

Security researchers at multiple threat intelligence firms have observed a significant acceleration in The Gentlemen ransomware group's operational tempo and technical capabilities...

RansomwareThreat IntelMalware
Read More → Use Tool →
2026-04-21Dark Reading
Chinese APT Targets Indian Banks, Korean Policy in New Cyber Campaign

A newly identified Chinese advanced persistent threat (APT) group has launched a coordinated cyber‑espionage campaign against major Indian financial institutions and South Korean p...

APTThreat IntelMalware
Read More → Use Tool →
2026-04-17Dark Reading
NIST's NVD Cuts Spark Rise of Private CVE Enrichment

NIST's National Vulnerability Database (NVD) has historically been the primary source of enriched CVE data, attaching CVSS v3.1 vector strings, severity ratings, affected product C...

VulnerabilityRegulationThreat Intel
Read More → Use Tool →
2026-04-17Dark Reading
Tycoon 2FA Phishers Switch to Device Code Phishing Attacks

Tycoon, a well‑known phishing collective that has long abused two‑factor authentication (2FA) bypass tricks, has quietly shifted to a new attack vector: OAuth 2.0 device‑code phish...

PhishingAuthenticationThreat Intel
Read More → Use Tool →
2026-04-14Ars Technica
UK Government Mythos AI Tests Cut Cybersecurity Hype, Identify Real Threats

The UK Cabinet Office’s Emerging Technology Cybersecurity Division (ETCD), in close collaboration with the National Cyber Security Centre (NCSC), has publicly released results from...

AI SecurityThreat Intel
Read More → Use Tool →
2026-04-06KrebsOnSecurity
Germany Doxes 'UNKN', Head of REvil & GandCrab Ransomware Gangs

German authorities have publicly exposed the identity of the notorious hacker known as "UNKN", linking the alias to 31‑year‑old Russian national Daniil Maksimov. Maksimov is allege...

RansomwareThreat IntelPrivacy
Read More → Use Tool →
2026-03-23KrebsOnSecurity
CanisterWorm Worm Targets Iran via Cloud Services, Wipes Data

Security researchers at SecureSphere Labs have uncovered a new file‑wiping worm they have named CanisterWorm, attributed to a financially motivated threat actor tracked under the a...

MalwareCloud SecurityThreat Intel
Read More → Use Tool →
2026-03-20KrebsOnSecurity
Feds Dismantle Four IoT Botnets Behind Massive DDoS Attacks

The U.S. Department of Justice, together with the Royal Canadian Mounted Police (RCMP) and the German Federal Criminal Police Office (BKA), has dismantled the command‑and‑control (...

MalwareThreat IntelIncident Response
Read More → Use Tool →
2022-08-30Threatpost
Watering Hole Attacks Spread ScanBox Keylogger via APT TA423

Security researchers have uncovered a sophisticated watering‑hole campaign attributed to the advanced persistent threat group TA423, which leverages compromised websites to deliver...

APTMalwareThreat Intel
Read More → Use Tool →
2022-08-29Threatpost
0ktapus Phishing Attacks Compromised 130 Firms, Bypassed MFA

A coordinated phishing operation attributed to the threat group 0ktapus has ensnared more than 130 organizations across multiple industries, according to researchers at Threatpost....

PhishingThreat IntelAuthentication
Read More → Use Tool →