Cyber Espionage Threat Intelligence4 Min Read September 24, 2025 UNC5221 Uses BRICKSTORM Backdoor to Infiltrate U.S. Legal and Technology Sectors Companies in the legal services, software-as-a-service (SaaS) providers, Business Process Outsourcers (BPOs), and technology sectors in the…
Malware Threat Intelligence7 Min Read September 21, 2025 DPRK Hackers Use ClickFix to Deliver BeaverTail Malware in Crypto Job Scams Threat actors with ties to the Democratic People's Republic of Korea (aka DPRK or North Korea) have been observed leveraging ClickFix-style…
Malware Phishing Ransomware Vulnerabilities4 Min Read September 19, 2025 The Good, the Bad and the Ugly in Cybersecurity – Week 38 The Good | Federal Courts Crack Down on BreachForums & UNC3944 Cybercrime Operators Conor Brian Fitzpatrick, the 22-year-old operator of…
Cyber Espionage Malware2 Min Read September 17, 2025 Chinese TA415 Uses VS Code Remote Tunnels to Spy on U.S. Economic Policy Experts A China-aligned threat actor known as TA415 has been attributed to spear-phishing campaigns targeting the U.S. government, think tanks, and…
Cybersecurity Hacking News24 Min Read September 15, 2025 ⚡ Weekly Recap: Bootkit Malware, AI-Powered Attacks, Supply Chain Breaches, Zero-Days & More In a world where threats are persistent, the modern CISO's real job isn't just to secure technology—it's to preserve institutional trust…