North Korean Hackers Exploit Cloud Platforms in Sophisticated Crypto Theft Operations
A recently published threat report by Google Cloud has revealed a new cloud-based crypto theft technique linked to a North Korean cyber group. The...
Malware Disguised as VPN Software Found Abusing GitHub’s Open Platform
A new malware campaign is using GitHub to quietly distribute an infostealer tool under the pretense of free utility software, raising renewed concerns over...
North Korean Operatives Used Fake Identities to Infiltrate Blockchain Firms and...
U.S. law enforcement has revealed new details about a sophisticated North Korean scheme in which operatives posed as remote IT professionals to infiltrate blockchain...
Cryptostealing Malware Found in Printer Software Highlights Growing Supply Chain Threat
A concerning cybersecurity incident has shed new light on the potential risks lurking in unexpected hardware—this time, printers. Users of certain devices from Procolored,...
North Korean Hacker Group Adapts Remote Work Fraud Tactics
New research reveals that the North Korean cyber group known as Nickel Tapestry is evolving its remote work deception tactics, expanding beyond U.S. companies...
North Korean Hackers Set Up Fake U.S. Businesses to Target Cryptocurrency...
A recent cybersecurity investigation has revealed that North Korean cyber operatives created two U.S.-based companies, Blocknovas LLC and Softglide LLC, in direct violation of...
The Rising Threat of a New Remote Access Trojan with Destructive...
A new remote access Trojan (RAT), known as Neptune, is making waves in the cybersecurity world for its ability to quietly infiltrate Windows devices...
Largest-Ever Crypto Heist steals $1.4 Billion
Cryptocurrency exchange Bybit became the latest victim of a major cyberattack, marking what appears to be the largest crypto hack in history. The breach,...
Emerging Cyber Threats: Rising Mobile and PC Malware
As cybersecurity threats continue to evolve, a new report by Check Point reveals some of the most prevalent malware strains targeting both Android and...
North Korean Hacker Group Embeds Malware in Developer Tools
North Korea's notorious Lazarus Group, known for high-profile cryptocurrency thefts, has evolved its cyberattack strategy to target software supply chains. Security experts have uncovered...
Massive Crypto Mining Cyber Campaign Spreads via USB Drives
A new and persistent cybersecurity threat, named Tangerine Turkey, has been identified as a major player in a widespread global crypto mining campaign. This...
Cybercriminals Exploit LA Wildfires with Sophisticated Scams
As the devastating wildfires continue to wreak havoc in Los Angeles, cybercriminals are seizing the opportunity to exploit the chaos, targeting both victims and...
Regime-Backed North Korean Hackers Steal $308 Million in Cyberattack
In a major cyber heist, North Korean-linked hackers stole $308 million in cryptocurrency from the Japanese crypto exchange DMM Bitcoin. The FBI, in collaboration...
The Small Modular Nuclear Reactor for Energy-Hungry Data Centers
As the global demand for artificial intelligence (AI) and cloud services surges, so does the pressure on data centers to meet their ever-growing energy...
Scammers Target OpenAI Twitter with Fake Token Scheme
On September 24th, the Twitter account of OpenAI, the company behind the ChatGPT platform, was hijacked by scammers who posted a fraudulent announcement regarding...
Trump Family X Accounts Hacked
In a troubling incident, scammers have compromised the X accounts of several Trump family members to promote a fraudulent cryptocurrency token, before the launch...
Blockchain Method Protects Personal User Data
Imagine this scenario: you enter a website, and before you can access any of the information there is an annoying popup asking you to...
Call for Startups – iHLS Innovation Centre
iHLS is an accelerator for the security sector and its various unique characteristics that provides startups with recognition, international exposure, access to investors and...
Researchers Develop Possible Solution to Disinformation
Researchers from the University of Waterloo's Faculty of Engineering are developing a first-of-its-kind innovative system against fake news that relies on blockchain. Their goal?...
Decentralized Storage – A Solution to Cloud-Based Attacks
Nowadays, turning to cloud-based providers for data storage is a common practice of businesses. It offers a convenient and affordable solution, cutting costs of...
Blockchain Based Social Media Shows Promise
Nowadays, everybody is talking about data security and privacy, especially when talking about the future of social media. Platforms based on blockchain are also...
Blockchain As a Robot Communication Tool
The technology used for salespeople documentation and evaluation is now helping police departments. The vast majority of police body camera footage never gets reviewed,...














































