Hacker Groups & Activities

Iran-Aligned Hackers Target Protest Supporters

Analytics Intelligence

Iran-Aligned Hackers Target Protest Supporters

With years of experience tracking state-sponsored threat actors from within global corporations, Malik Haidar has a unique vantage point on the intersection of geopolitics and cyber warfare. He joins us today to dissect the CRESCENTHARVEST campaign,

Analytics Intelligence Ukrainian Sentenced for North Korean IT Job Fraud Scheme

The digital shadows of the modern global economy recently converged in a federal courtroom as a 29-year-old Ukrainian man received a five-year prison sentence for his role in a massive identity theft ring. Oleksandr "Alexander" Didenko stood at the center of a sophisticated operation that

Ukrainian Sentenced for North Korean IT Job Fraud Scheme
Hackers & Threats Are Hackers Weaponizing Flaws Faster Than Ever?

The time between the public disclosure of a software vulnerability and its active exploitation by malicious actors has become alarmingly short, transforming routine IT management into a high-stakes race against an ever-accelerating threat. The recent addition of five actively exploited

Are Hackers Weaponizing Flaws Faster Than Ever?
Hackers & Threats AI Surge Drives Record Ransomware Attacks and Declining Profits

The digital landscape of 2025 was defined by a startling contradiction where the sheer volume of ransomware attacks reached unprecedented heights even as the financial rewards for cybercriminals began to shrink. The year closed with a documented 30% surge in victims, yet this escalation in activity

AI Surge Drives Record Ransomware Attacks and Declining Profits
Security North Korean Hackers Use Deepfakes in Crypto Heist

The line between a trusted colleague on a video call and a state-sponsored actor intent on draining corporate accounts has become dangerously blurred, creating a new paradigm of digital impersonation that challenges the very foundation of online trust. This report analyzes a sophisticated

North Korean Hackers Use Deepfakes in Crypto Heist
Analytics Intelligence Is Your Dell System a Backdoor for Chinese Hackers?

A critical security flaw discovered in a widely used Dell enterprise product has become the focal point of a sophisticated cyberespionage campaign, transforming what many considered a trusted failsafe into a potential gateway for state-sponsored threat actors. The active exploitation of this

Is Your Dell System a Backdoor for Chinese Hackers?
Analytics Intelligence Is AI Turning Amateurs Into Expert Hackers?

A disheveled individual, clearly under the influence, records a threatening video message from their bed, yet the words they speak are sharp, precise, and carry the calculated menace of a seasoned extortionist. This scene, once the stuff of clumsy, easily dismissed attempts at intimidation, now

Is AI Turning Amateurs Into Expert Hackers?
Loading
subscription-bg
Subscribe to Our Weekly News Digest

Stay up-to-date with the latest security news delivered weekly to your inbox.

Invalid Email Address
subscription-bg
Subscribe to Our Weekly News Digest

Stay up-to-date with the latest security news delivered weekly to your inbox.

Invalid Email Address