Cybercriminal activity is escalating across multiple fronts, with the global “TamperedChef” malvertising operation distributing fake software installers that deliver JavaScript-based remote access malware. At the same time, Iran-linked groups such as APT Imperial Kitten and APT MuddyWater are advancing the practice of “cyber-enabled kinetic targeting,” using cyber reconnaissance to support and refine real-world military strikes. Adding to the threat landscape, researchers have uncovered the Sturnus Android malware, a versatile and highly invasive tool capable of stealing data from secure messaging apps, including Signal, WhatsApp, and Telegram. Continue reading for more cybersecurity updates.