International crackdown on cybercrime results in 306 arrests
The operation, known as Operation Red Card, took place between November 2024 and February 2025 and targeted cross-border criminal syndicates.
The operation, known as Operation Red Card, took place between November 2024 and February 2025 and targeted cross-border criminal syndicates.
In brief: Windows zero-day abused in widespread APT campaigns, the US lifts sanctions on Tornado Cash, and more.
The tactics and tools employed by UAT-5918 overlap with other state-sponsored threat groups, such as Volt Typhoon, Flex Typhoon, and Earth Estries.
By exploiting hidden unicode characters and employing advanced evasion techniques, attackers can subtly alter the behavior of AI models.
Rather than immediately deploying newly registered domains, many threat actors now secure domain names months in advance.
The attacks have been detected across several different platforms, including the popular messaging application Signal.
11 state-sponsored APT groups from North Korea, Iran, Russia, and China have exploited this vulnerability for cyber espionage.
The fraud campaign utilized a range of deceptive tactics to evade detection and bypass Android security restrictions.
The malware targets various data, including browser credentials, digital wallet details, clipboard contents, and system data.
The leaked logs reveal apparent connection between BlackBasta’s leader Oleg Nefedov and Russian officials.
Showing elements 721 - 730