Hacker Groups & Activities

How Did a Cyber-Attack Cost JLR £485 Million in Losses?

Hackers & Threats

How Did a Cyber-Attack Cost JLR £485 Million in Losses?

In an era where digital transformation drives industrial success, the automotive sector faces an alarming threat that can cripple even the mightiest players, as demonstrated by Jaguar Land Rover (JLR), the UK’s largest carmaker and a subsidiary of

Hackers & Threats How Did Five Enable North Korean Cyber Fraud in the US?

What happens when a rogue state turns remote work into a weapon against American businesses? In a startling breach of trust, over 136 US organizations have fallen victim to a multimillion-dollar fraud scheme orchestrated by North Korean hackers with the help of five key facilitators. This isn’t j

How Did Five Enable North Korean Cyber Fraud in the US?
Hackers & Threats UNC1549's Sophisticated Cyber Espionage in Aerospace Sector

In the intricate and high-stakes world of cybersecurity, few adversaries pose as grave a threat to critical industries as UNC1549, a suspected Iran-nexus threat actor with a razor-sharp focus on the aerospace, aviation, and defense sectors. Mandiant’s latest report, delving into the group’s tac

UNC1549's Sophisticated Cyber Espionage in Aerospace Sector
Analytics Intelligence Iranian Hackers' SpearSpecter Targets Defense and Government

As cyber threats continue to evolve, few are as intricate and persistent as the state-sponsored espionage campaigns targeting high-value individuals and organizations. Today, we’re diving deep into the world of cybersecurity with Malik Haidar, a seasoned expert who has spent years combating digital

Iranian Hackers' SpearSpecter Targets Defense and Government
Analytics Intelligence Critical Triofox Flaw Exploited by UNC6485 Threat Actor

What happens when a tool designed to secure remote work becomes the key to a devastating cyberattack? In a chilling development, a critical vulnerability in Triofox, a widely used file-sharing and remote access solution by Gladinet, has been exploited by a sophisticated threat actor known as

Critical Triofox Flaw Exploited by UNC6485 Threat Actor
Hackers & Threats Weekly Cyber Threats: Hyper-V Malware, AI Bots, and More

In an era where digital innovation shapes every aspect of daily life, the cybersecurity landscape has become a relentless battleground of cunning and chaos, with threats evolving faster than many defenses can adapt, demanding constant vigilance from individuals and organizations alike. This week’s s

Weekly Cyber Threats: Hyper-V Malware, AI Bots, and More
Hackers & Threats GootLoader Returns with Sneaky Font Trick on WordPress Sites

In an era where cyber threats evolve at an alarming pace, a familiar menace has resurfaced with a cunning new strategy to infiltrate systems and evade detection, targeting unsuspecting users through compromised platforms. Cybersecurity experts have recently flagged a resurgence of GootLoader, a

GootLoader Returns with Sneaky Font Trick on WordPress Sites
Loading
subscription-bg
Subscribe to Our Weekly News Digest

Stay up-to-date with the latest security news delivered weekly to your inbox.

Invalid Email Address
subscription-bg
Subscribe to Our Weekly News Digest

Stay up-to-date with the latest security news delivered weekly to your inbox.

Invalid Email Address