Hacker Groups & Activities

APT37 Weaponizes USB Drives to Breach Air-Gapped Networks

Hackers & Threats

APT37 Weaponizes USB Drives to Breach Air-Gapped Networks

Physical isolation has long served as the ultimate firewall for the world’s most guarded secrets, yet a humble thumb drive has proven that no gap is too wide for a determined adversary. While the cybersecurity industry remains fixated on sophistica

Analytics Intelligence Hackers Exploit Cisco Zero-Day in Global Espionage Campaign

The silent infiltration of global network perimeters has reached a critical inflection point, as sophisticated adversaries demonstrate that even the most trusted edge infrastructure can become a transparent gateway for state-sponsored surveillance. Modern enterprise and government frameworks rely

Hackers Exploit Cisco Zero-Day in Global Espionage Campaign
Hackers & Threats SLH Cyber Group Recruits Women for Advanced Vishing Attacks

Malik Haidar stands at the intersection of human psychology and high-level network security, having spent years defending multinational infrastructures from the world’s most sophisticated hacking collectives. His deep understanding of how threat actors exploit organizational trust has made him a l

SLH Cyber Group Recruits Women for Advanced Vishing Attacks
Analytics Intelligence How Did Chinese Spies Use Google Sheets for Global Espionage?

Analyzing the Weaponization of SaaS Platforms for Stealthy Cyber Surveillance In the quiet corridors of digital bureaucracy, a simple spreadsheet might appear as the ultimate symbol of corporate monotony, yet for state-sponsored actors, it has recently served as the perfect cloaking device for

How Did Chinese Spies Use Google Sheets for Global Espionage?
Analytics Intelligence Russian Group Targets European Finance Aiding Ukraine

The digital perimeter of the conflict in Ukraine has shifted from the localized energy grids of Kyiv to the highly secured servers of Western European financial institutions. While the world remains focused on the physical movement of troops, a more insidious campaign is unfolding within the

Russian Group Targets European Finance Aiding Ukraine
Analytics Intelligence Iran-Aligned Hackers Target Protest Supporters

With years of experience tracking state-sponsored threat actors from within global corporations, Malik Haidar has a unique vantage point on the intersection of geopolitics and cyber warfare. He joins us today to dissect the CRESCENTHARVEST campaign, a sophisticated operation targeting Iranian

Iran-Aligned Hackers Target Protest Supporters
Analytics Intelligence Ukrainian Sentenced for North Korean IT Job Fraud Scheme

The digital shadows of the modern global economy recently converged in a federal courtroom as a 29-year-old Ukrainian man received a five-year prison sentence for his role in a massive identity theft ring. Oleksandr "Alexander" Didenko stood at the center of a sophisticated operation that

Ukrainian Sentenced for North Korean IT Job Fraud Scheme
Loading
subscription-bg
Subscribe to Our Weekly News Digest

Stay up-to-date with the latest security news delivered weekly to your inbox.

Invalid Email Address
subscription-bg
Subscribe to Our Weekly News Digest

Stay up-to-date with the latest security news delivered weekly to your inbox.

Invalid Email Address