Emerging Threats

North Korea Sets New Record with $2 Billion Crypto Heist

Hackers & Threats

North Korea Sets New Record with $2 Billion Crypto Heist

The Digital Heist of the Century: How a Nation Became Crypto's Apex PredatorThe global digital asset market is reeling from a series of sophisticated cyberattacks in 2025, which saw North Korea–affiliated hacking syndicates siphon over $2 billion i

Hackers & Threats Kimwolf Botnet Infects 1.8 Million Android TV Boxes

A previously unknown malware campaign has silently compromised an estimated 1.8 million Android TV boxes across the globe, creating a colossal botnet that only revealed its immense scale when one of its control domains briefly became the most queried domain online, even surpassing industry giants

Kimwolf Botnet Infects 1.8 Million Android TV Boxes
Hackers & Threats New FrogBlight Android Trojan Steals Banking Credentials

A meticulously crafted social engineering campaign is currently exploiting user trust in official institutions to deploy a potent new Android trojan, a sophisticated malware that operates as both a credential stealer and comprehensive spyware. This threat initiates its attack through a seemingly

New FrogBlight Android Trojan Steals Banking Credentials
Hackers & Threats Russia Pays Hackers With Crypto to Attack NATO

In the shadowy theaters of modern geopolitical conflict, a new and alarming model of state-sponsored aggression has taken root, blurring the lines between ideologically driven hacktivism and financially incentivized cyber warfare. A pro-Russian hacker collective has refined a strategy that

Russia Pays Hackers With Crypto to Attack NATO
Analytics Intelligence Stolen AWS Credentials Fuel Rapid Cryptomining Campaign

A meticulously orchestrated cyber campaign recently demonstrated just how quickly threat actors can weaponize compromised cloud credentials, deploying extensive cryptomining operations across multiple AWS customer environments in under ten minutes. This incident serves as a stark reminder that as

Stolen AWS Credentials Fuel Rapid Cryptomining Campaign
Security Critical Flaws in PickleScan Put AI Supply Chain at Risk

A recent in-depth security analysis has uncovered a trio of critical vulnerabilities within PickleScan, a widely-adopted tool for securing Python pickle files and PyTorch models, casting a shadow over the integrity of the AI supply chain. With the rapid integration of machine learning models into

Critical Flaws in PickleScan Put AI Supply Chain at Risk
Hackers & Threats Hackers Actively Exploit Flaws in Apple, WinRAR, and React

The narrow chasm between the public disclosure of a software vulnerability and its widespread, malicious exploitation has virtually disappeared, creating a high-stakes race against time for defenders across the globe. This analysis synthesizes a broad spectrum of recent cybersecurity incidents to

Hackers Actively Exploit Flaws in Apple, WinRAR, and React
Loading
subscription-bg
Subscribe to Our Weekly News Digest

Stay up-to-date with the latest security news delivered weekly to your inbox.

Invalid Email Address
subscription-bg
Subscribe to Our Weekly News Digest

Stay up-to-date with the latest security news delivered weekly to your inbox.

Invalid Email Address