Netcrook

Threat Actors

2317 article(s)

Inside the Shadow Web: Ukrainian Broker Sentenced for North Korea IT Worker Fraud

🗓 21 Feb 2026 · 👤 LOGICFALCON · 🌍 Europe

A Ukrainian IT broker was sentenced to five years for running a digital identity operation that allowed North Koreans to infiltrate U.S. tech companies, costing millions and exposing vulnerabilities in global freelance platforms.

Inside the AI-Driven Cybercrime Surge: How Hackers Are Outpacing Defenders

🗓 19 Feb 2026 · 👤 CRYSTALPROXY

Cyber attackers are using artificial intelligence to breach systems faster than ever, exploiting vulnerabilities and trusted integrations at unprecedented speed. Learn how defenders are struggling to keep pace in the new era of AI-driven cybercrime.

Silent Saboteurs: Trellix SecondSight and the Battle Against Stealth Cyberattacks

🗓 16 Feb 2026 · 👤 LOGICFALCON

Trellix SecondSight targets the stealthiest cyber threats that traditional defenses miss. By blending AI analytics with expert hunters, the service proactively detects low-noise attacks and empowers organizations to respond before damage is done.

VoidLink Malware: UAT-9921’s Modular Framework Targets Tech and Finance

🗓 13 Feb 2026 · 👤 CRYSTALPROXY

A new modular, AI-assisted malware called VoidLink is targeting technology and financial sectors. Investigators reveal how UAT-9921 uses advanced tactics, stealth features, and role-based controls to breach cloud environments.

Shadow Networks: Cybercriminals Hijack Home Routers for Espionage

🗓 12 Feb 2026 · 👤 LOGICFALCON · 🌍 Asia

Sophisticated attackers are transforming ordinary household devices into covert relay boxes, masking the origins of major cyberattacks and confounding defenders worldwide.

Virtual Shadows: Muddled Libra’s Rogue VM Attack on VMware vSphere Exposes New Threat Tactics

🗓 12 Feb 2026 · 👤 CRYSTALPROXY

Muddled Libra’s latest attack leveraged a rogue virtual machine inside VMware vSphere, exposing how modern threat actors exploit virtual infrastructure and social engineering for credential theft and data exfiltration.

VoidLink: AI-Driven Malware Framework Delivers On-Demand Hacking Tools

🗓 12 Feb 2026 · 👤 LOGICFALCON · 🌍 Asia

VoidLink is a next-generation malware framework arming attackers with AI-powered, on-demand plugin generation and enterprise-grade management, signaling a major evolution in cybercrime tactics.

From Side Hustle to Cyber Sleuth: Douglas Day’s Unconventional Path to Professional Hacking

🗓 12 Feb 2026 · 👤 CRYSTALPROXY

Douglas Day’s journey from pragmatic side hustler to full-time professional hacker challenges hacker stereotypes, proving that ethical hacking can be a deliberate and rewarding career.

Inside Italy's Secret Cyber Room: How the Farnesina Fights Digital Threats

🗓 11 Feb 2026 · 👤 LOGICFALCON · 🌍 Europe

Italy’s Ministry of Foreign Affairs unveils the CSIRT Cyber Room, a cutting-edge facility designed to detect and neutralize cyber threats against its diplomatic networks. This feature explores the center’s role in national security and the global cyber arms race.

Inside Italy’s Cyber War Room: Farnesina’s 24/7 Digital Defense

🗓 10 Feb 2026 · 👤 CRYSTALPROXY · 🌍 Europe

Italy’s Foreign Ministry has unveiled a 24/7 Cyber Room after neutralizing massive attacks on its diplomatic sites. This investigative feature reveals how the Farnesina’s CSIRT is reshaping digital defense, handling over 150,000 attacks and safeguarding Italy’s international presence.

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 Next »