China-linked crew embedded in US energy networks

The cybersecurity landscape is increasingly threatened by state-sponsored groups, particularly from China and Russia, targeting critical infrastructure in the US. Notably, the Volt Typhoon group has been embedding malware in US energy networks.

Hackers target supporters of Iran protests in new espionage campaign

A cyberespionage campaign targets supporters of Iran's anti-government protests, focusing on Farsi-speaking Iranians, activists, and journalists. The campaign exploits the ongoing internet blackout in Iran and is linked to Iranian-aligned hackers.

One threat actor responsible for 83% of recent Ivanti RCE attacks

A single threat actor is responsible for the majority of exploitation activities targeting two critical vulnerabilities in Ivanti Endpoint Manager Mobile (EPMM), identified as CVE-2026-21962 and CVE-2026-24061.

Snail mail letters target Trezor and Ledger users in crypto-theft attacks

Hackers are targeting Trezor and Ledger users with physical phishing letters, urging them to scan QR codes leading to malicious sites. These letters claim that users must complete an "Authentication Check" or "Transaction Check" by specific dates.

North Korean hackers targeted crypto exec with fake Zoom meeting, ClickFix scam

North Korean hackers, identified as UNC1069, targeted a cryptocurrency executive using a fake Zoom meeting and ClickFix scam. The attack aimed to enable cryptocurrency theft and fuel future social engineering campaigns.

State-backed phishing attacks targeting military officials and journalists on Signal

A state-backed hacking group is targeting military officials, journalists, and diplomats in Germany and Europe through phishing attacks on Signal. These attacks aim to gain unauthorized access to accounts by impersonating Signal support.

Notepad++ users take note: It’s time to check if you’re hacked

A critical security breach has been identified in the update infrastructure of Notepad++, a widely used text editor for Windows. The breach, attributed to suspected Chinese state hackers.

Shadow Directories: A Unique Method to Hijack WordPress Permalinks

A new method of hijacking WordPress permalinks involves the creation of shadow directories. This technique allows attackers to inject spam content into search engine results without altering the visible content on the website or its database.

Supply chain attack on eScan antivirus: detecting and remediating malicious updates

A supply chain attack targeted eScan antivirus software, distributing malware through its update server. The attack involved a malicious file that initiated a multi-stage infection chain.

Researcher’s Notebook: Inside the EmEditor supply chain compromise

The EmEditor supply chain compromise involved tampering with Windows Installer (MSI) packages to embed malicious scripts. The attackers used look-alike domains and command-and-control (C2) infrastructure to execute their operations.

Defend Against Threats with Cyber Fusion

Cyware is the leading provider of cyber fusion solutions that power threat intelligence sharing , end-to-end automation and 360-degree threat response.

Trending Tags