Skip to content
Chinese Hackers Murky, Genesis, and Glacial Panda Escalate Cloud and Telecom Espionage

Chinese Hackers Murky, Genesis, and Glacial Panda Escalate Cloud and Telecom Espionage

Cybersecurity researchers are calling attention to malicious activity orchestrated by a China-nexus cyber espionage group known as Murky Panda that involves abusing trusted relationships in the cloud to breach enterprise networks. “The adversary has also shown considerable ability to quickly weaponize N-day and zero-day vulnerabilities and frequently achieves initial accessRead More »Chinese Hackers Murky, Genesis, and Glacial Panda Escalate Cloud and Telecom Espionage

INTERPOL Arrests 1,209 Cybercriminals Across 18 African Nations in Global Crackdown

INTERPOL Arrests 1,209 Cybercriminals Across 18 African Nations in Global Crackdown

INTERPOL on Friday announced that authorities from 18 countries across Africa have arrested 1,209 cybercriminals who targeted 88,000 victims. “The crackdown recovered $97.4 million and dismantled 11,432 malicious infrastructures, underscoring the global reach of cybercrime and the urgent need for cross-border cooperation,” the agency said. The effort is the secondRead More »INTERPOL Arrests 1,209 Cybercriminals Across 18 African Nations in Global Crackdown

AI Agents Need Data Integrity

Think of the Web as a digital territory with its own social contract. In 2014, Tim Berners-Lee called for a “Magna Carta for the Web” to restore the balance of power between individuals and institutions. This mirrors the original charter’s purpose: ensuring that those who occupy a territory have aRead More »AI Agents Need Data Integrity

CPAP Medical Data Breach Impacts 90,000 People

CPAP Medical Supplies and Services has disclosed a data breach resulting from an intrusion that occurred in December 2024. The post CPAP Medical Data Breach Impacts 90,000 People appeared first on SecurityWeek.

Modern vehicle cybersecurity trends

Modern vehicle cybersecurity trends

Modern vehicles are transforming into full-fledged digital devices that offer a multitude of features, from common smartphone-like conveniences to complex intelligent systems and services designed to keep everyone on the road safe. However, this digitalization, while aimed at improving comfort and safety, is simultaneously expanding the vehicle’s attack surface. InRead More »Modern vehicle cybersecurity trends

Hundreds Targeted in New Atomic macOS Stealer Campaign

Between June and August, over 300 entities were targeted with the Atomic macOS Stealer via malvertising. The post Hundreds Targeted in New Atomic macOS Stealer Campaign appeared first on SecurityWeek.

MITRE Updates List of Most Common Hardware Weaknesses

MITRE has updated the list of Most Important Hardware Weaknesses to align it with evolving hardware security challenges. The post MITRE Updates List of Most Common Hardware Weaknesses appeared first on SecurityWeek.

Ex-Developer Jailed Four Years for Sabotaging Ohio Employer with Kill-Switch Malware

Ex-Developer Jailed Four Years for Sabotaging Ohio Employer with Kill-Switch Malware

A 55-year-old Chinese national has been sentenced to four years in prison and three years of supervised release for sabotaging his former employer’s network with custom malware and deploying a kill switch that locked out employees when his account was disabled. Davis Lu, 55, of Houston, Texas, was convicted ofRead More »Ex-Developer Jailed Four Years for Sabotaging Ohio Employer with Kill-Switch Malware

Copyright © 2025 infosecintel.net