News
APT28 Uses BEARDSHELL and COVENANT Malware to Spy on Ukrainian Military
2+ hour, 57+ min ago (583+ words) The Russian state-sponsored hacking group tracked as APT28 has been observed using a pair of implants dubbed BEARDSHELL and COVENANT to facilitate long'term surveillance of Ukrainian military personnel. The two malware families have been put to use since April 2024, ESET said…...
Web Server Exploits and Mimikatz Used in Attacks Targeting Asian Critical Infrastructure
1+ day, 6+ hour ago (588+ words) High-value organizations located in South, Southeast, and East Asia have been targeted by a Chinese threat actor as part of a years-long campaign. The activity, which has targeted aviation, energy, government, law enforcement, pharmaceutical, technology, and telecommunications sectors, has been…...
Preparing for the Quantum Era: Post-Quantum Cryptography Webinar for Security Leaders
5+ day, 1+ hour ago (282+ words) Most organizations assume encrypted data is safe. But many attackers are already preparing for a future where today's encryption can be broken. Instead of trying to decrypt information now, they are collecting encrypted data and storing it so it can…...
Dust Specter Targets Iraqi Officials with New SPLITDROP and GHOSTFORM Malware
5+ day, 2+ hour ago (563+ words) A suspected Iran-nexus threat actor has been attributed to a campaign targeting government officials in Iraq by impersonating the country's Ministry of Foreign Affairs to deliver a set of never-before-seen malware. Zscaler ThreatLabz, which observed the activity in January 2026, is…...
149 Hacktivist DDoS Attacks Hit 110 Organizations in 16 Countries After Middle East Conflict
5+ day, 21+ hour ago (484+ words) Cybersecurity researchers have warned of a surge in retaliatory hacktivist activity following the U.S.-Israel coordinated military campaign against Iran, codenamed Epic Fury and Roaring Lion. "The hacktivist threat in the Middle East is highly lopsided, with two groups, Keymous+ and…...
SloppyLemming Targets Pakistan and Bangladesh Governments Using Dual Malware Chains
1+ week, 7+ hour ago (445+ words) The threat activity cluster known as SloppyLemming has been attributed to a fresh set of attacks targeting government entities and critical infrastructure operators in Pakistan and Bangladesh. The activity, per Arctic Wolf, took place between January 2025 and January 2026. It involves…...
Expert Recommends: Prepare for PQC Right Now
1+ week, 5+ day ago (381+ words) Cryptography is the backbone of digital trust, but the looming era of quantum computing threatens its foundations. To combat the looming quantum computing threat, our cryptography must evolve immediately. This is why Post-Quantum Cryptography (PQC) [2] is being introduced as a…...
SLH Offers $500–$1,000 Per Call to Recruit Women for IT Help Desk Vishing Attacks
1+ week, 5+ day ago (354+ words) The notorious cybercrime collective known as Scattered LAPSUS$ Hunters (SLH) has been observed offering financial incentives to recruit women to pull off social engineering attacks. The idea is to hire them for voice phishing campaigns targeting IT help desks, Dataminr…...
APT28 Targeted European Entities Using Webhook-Based Macro Malware
2+ week, 19+ hour ago (446+ words) The Russia-linked state-sponsored threat actor tracked as APT28 has been attributed to a new campaign targeting specific entities in Western and Central Europe. The activity, per S2 Grupo's LAB52 threat intelligence team, was active between September 2025 and January 2026. It has been codenamed Operation…...
How Exposed Endpoints Increase Risk Across LLM Infrastructure
2+ week, 1+ day ago (198+ words) LLMs are rarely exposed through one failure; more often, exposure happens gradually through small assumptions and decisions made during development and deployment. Over time, these patterns transform internal services into externally reachable attack surfaces. Some of the most common exposure…...