• Europol Dismantles $540 Million Cryptocurrency Fraud Network, Arrests Five Suspects

    Europol Dismantles $540 Million Cryptocurrency Fraud Network, Arrests Five Suspects

    Europol on Monday announced the takedown of a cryptocurrency investment fraud ring that laundered €460 million ($540 million) from more than 5,000 victims across the world. The operation, the agency said, was carried out by the Spanish Guardia Civil, along with support from law enforcement authorities from Estonia, France, and the United States. Europol said…

    Read More

  • Blind Eagle Uses Proton66 Hosting for Phishing, RAT Deployment on Colombian Banks

    Blind Eagle Uses Proton66 Hosting for Phishing, RAT Deployment on Colombian Banks

    The threat actor known as Blind Eagle has been attributed with high confidence to the use of the Russian bulletproof hosting service Proton66. Trustwave SpiderLabs, in a report published last week, said it was able to make this connection by pivoting from Proton66-linked digital assets, leading to the discovery of an active threat cluster that…

    Read More

  • Leveraging Credentials As Unique Identifiers: A Pragmatic Approach To NHI Inventories 

    Leveraging Credentials As Unique Identifiers: A Pragmatic Approach To NHI Inventories 

    Identity-based attacks are on the rise. Attacks in which malicious actors assume the identity of an entity to easily gain access to resources and sensitive data have been increasing in number and frequency over the last few years. Some recent reports estimate that 83% of attacks involve compromised secrets. According to reports such as the…

    Read More

  • FBI Warns of Scattered Spider’s Expanding Attacks on Airlines Using Social Engineering

    FBI Warns of Scattered Spider’s Expanding Attacks on Airlines Using Social Engineering

    The U.S. Federal Bureau of Investigation (FBI) has revealed that it has observed the notorious cybercrime group Scattered Spider broadening its targeting footprint to strike the airline sector. To that end, the agency said it’s actively working with aviation and industry partners to combat the activity and help victims. “These actors rely on social engineering…

    Read More

  • GIFTEDCROOK Malware Evolves: From Browser Stealer to Intelligence-Gathering Tool

    GIFTEDCROOK Malware Evolves: From Browser Stealer to Intelligence-Gathering Tool

    The threat actor behind the GIFTEDCROOK malware has made significant updates to turn the malicious program from a basic browser data stealer to a potent intelligence-gathering tool. “Recent campaigns in June 2025 demonstrate GIFTEDCROOK’s enhanced ability to exfiltrate a broad range of sensitive documents from the devices of targeted individuals, including potentially proprietary files and

    Read More

  • Facebook’s New AI Tool Asks to Upload Your Photos for Story Ideas, Sparking Privacy Concerns

    Facebook’s New AI Tool Asks to Upload Your Photos for Story Ideas, Sparking Privacy Concerns

    Facebook, the social network platform owned by Meta, is asking for users to upload pictures from their phones to suggest collages, recaps, and other ideas using artificial intelligence (AI), including those that have not been directly uploaded to the service. According to TechCrunch, which first reported the feature, users are being served a new pop-up…

    Read More

  • Over 1,000 SOHO Devices Hacked in China-linked LapDogs Cyber Espionage Campaign

    Over 1,000 SOHO Devices Hacked in China-linked LapDogs Cyber Espionage Campaign

    Threat hunters have discovered a network of more than 1,000 compromised small office and home office (SOHO) devices that have been used to facilitate a prolonged cyber espionage infrastructure campaign for China-nexus hacking groups. The Operational Relay Box (ORB) network has been codenamed LapDogs by SecurityScorecard’s STRIKE team. “The LapDogs network has a high concentration…

    Read More

  • PUBLOAD and Pubshell Malware Used in Mustang Panda’s Tibet-Specific Attack

    PUBLOAD and Pubshell Malware Used in Mustang Panda’s Tibet-Specific Attack

    A China-linked threat actor known as Mustang Panda has been attributed to a new cyber espionage campaign directed against the Tibetan community. The spear-phishing attacks leveraged topics related to Tibet, such as the 9th World Parliamentarians’ Convention on Tibet (WPCT), China’s education policy in the Tibet Autonomous Region (TAR), and a recently published book by…

    Read More

  • Business Case for Agentic AI SOC Analysts

    Business Case for Agentic AI SOC Analysts

    Security operations centers (SOCs) are under pressure from both sides: threats are growing more complex and frequent, while security budgets are no longer keeping pace. Today’s security leaders are expected to reduce risk and deliver results without relying on larger teams or increased spending. At the same time, SOC inefficiencies are draining resources. Studies show…

    Read More

  • MOVEit Transfer Faces Increased Threats as Scanning Surges and CVE Flaws Are Targeted

    MOVEit Transfer Faces Increased Threats as Scanning Surges and CVE Flaws Are Targeted

    Threat intelligence firm GreyNoise is warning of a “notable surge” in scanning activity targeting Progress MOVEit Transfer systems starting May 27, 2025—suggesting that attackers may be preparing for another mass exploitation campaign or probing for unpatched systems.MOVEit Transfer is a popular managed file transfer solution used by businesses and government agencies to share sensitive data

    Read More