Justice Department Dismantles North Korean IT Labor Schemes in US
Five individuals pleaded guilty to helping North Korean IT schemes in the U.S. Authorities seized $15 million in cryptocurrency linked…
Chinese Hackers Use Claude AI in Espionage, Rely on Human Oversight
Chinese hackers used Claude AI to breach 30 organizations. Human oversight was critical throughout the AI-driven attack process. Experts remain…
NRF Leads Retail Push to Build Cybersecurity Talent Pipeline
Retail cyberattacks cause financial and reputational harm to major brands. Industry leaders urge focus on executive-level cybersecurity talent development. NRF…
FBI Identifies Akira Ransomware as Leading Cyber Threat to US Businesses
Akira ransomware ranks among the FBI's top five cyber threats. The group primarily targets small and medium-sized enterprises across critical…
Hackers Steal Washington Post Data in Oracle Software Attack
Clop hackers exploited Oracle E-Business Suite, impacting nearly 10,000 Washington Post people. The breach involved stolen HR data, including bank…
Operation Endgame Hits Three Major Malware Networks in Global Sweep
Law enforcement dismantled major malware networks Rhadamanthys, VenomRAT, and Elysium. Operation Endgame required collaboration between multiple countries and private companies.…
Google Targets Lighthouse Text Scammers with Civil Lawsuit
Google sues Lighthouse scammers for widespread SMS phishing attacks. The suit targets trademark misuse and seeks strong legal remedies. New…
Amazon Exposes Early Zero-Day Attacks Targeting Cisco and Citrix
Amazon detected early exploitation of Cisco and Citrix zero-days by a skilled group. Attackers exploited the flaws before public disclosure…
FBI Targets Youth Cybercrime as Maryland Man Faces Federal Charges
Federal charges target young suspects of online sexual exploitation and coercion. Discord, Roblox, Snapchat, and Instagram contribute digital evidence to…
Microsoft Fixes 63 Security Flaws, One Zero-Day Under Active Attack
Microsoft patched 63 vulnerabilities, including an actively exploited Windows Kernel zero-day. Experts stress the complex race condition requires advanced skills…
