How crooks use IT to enable cargo theft – CSO Online
In the old days, crooks followed transport trucks and hijacked them. Today they use phishing, vishing and identity theft to find and divert valuable cargo via logistics systems. It’s a…
In the old days, crooks followed transport trucks and hijacked them. Today they use phishing, vishing and identity theft to find and divert valuable cargo via logistics systems. It’s a…
The well-known North Korean threat group continues to improve the obfuscation and anti-analysis features of its attack toolchain. – Read More
While tracking cyberattacks since last year, a Crowdstrike report also found that physical attacks and kidnappings have increased dramatically, particularly in Europe. “In January 2025, threat actors kidnapped and attempted…
An analysis of startup firm’s spending on AI applications finds the top categories to be productivity and content-generation. Security? Not so much. – Read More
A threat actor known as “Curly COMrades” is using Linux VMs to remain undetected in Windows environments while conducting Russia-aligned activities. – Read More
Successful ransomware groups have three key elements in common. Spoiler alert: indicators of success don’t all revolve around artificial intelligence. – Read More
European organizations face an escalating cyber threat landscape as attackers leverage geopolitical tensions and AI-enhanced social engineering for attacks. – Read More
The nascent collective that combines three prominent cybercrime groups, Scattered Spider, LAPSUS$, and ShinyHunters, has created no less than 16 Telegram channels since August 8, 2025. “Since its debut, the…
Nine people have been arrested in connection with a coordinated law enforcement operation that targeted a cryptocurrency money laundering network that defrauded victims of €600 million (~$688 million). According to…
Malware used in a months-long attack demonstrates how bad actors are misusing generative AI services in unique and stealthy ways. – Read More
Details have emerged about a now-patched critical security flaw in the popular “@react-native-community/cli” npm package that could be potentially exploited to run malicious operating system (OS) commands under certain conditions.…
Cybersecurity researchers have disclosed details of four security flaws in Microsoft Teams that could have exposed users to serious impersonation and social engineering attacks. The vulnerabilities “allowed attackers to manipulate…
Three cybersecurity professionals who specialized in helping companies respond to ransomware attacks have been charged with secretly running their own ransomware operation, deploying ALPHV BlackCat malware against at least five…
The Louvre Museum in Paris, victim of an audacious burglary involving a furniture lift last month, has been struggling for over a decade to upgrade outdated software, including that controlling…
In a newly uncovered campaign, threat actors embedded a previously undocumented backdoor, dubbed SesameOp, which exploits the OpenAI Assistants API for relaying commands and exfiltrating results. According to researchers at…