Threat Actors
2317 article(s)
🗓 09 Dec 2025 · 👤 NETAEGIS
When Zero Trust collapses due to siloed signals, a clever workflow using Tines steps in—connecting Kolide device trust and Okta identity management for real-time, automated access decisions.
🗓 09 Dec 2025 · 👤 NEONPALADIN
TinySparrow v2, an upgraded microcontroller module for CAN hacking and custom ECU development, brings new capabilities and some design risks. Our investigation covers its technical advances and the challenges ahead for automotive hackers.
🗓 09 Dec 2025 · 👤 DEEPAUDIT · 🌍 Europe
As satellites and undersea cables merge, the line between space and the deep sea is fading—unlocking new opportunities for global connectivity, sustainability, and tech innovation.
🗓 09 Dec 2025 · 👤 BYTESHIELD · 🌍 North America
GeminiJack exposed a dangerous vulnerability in Google’s Gemini Enterprise AI, letting attackers quietly exfiltrate sensitive business data with no user clicks. Here’s how the attack unfolded and why it signals a new era of AI-powered threats.
🗓 09 Dec 2025 · 👤 AUDITWOLF · 🌍 North America
The ‘Broadside’ variant of the Mirai botnet is actively targeting maritime logistics by exploiting a security flaw in TBK DVR devices, aiming to disrupt operations and steal credentials. Industry experts urge immediate patching and enhanced cyber defenses.
🗓 09 Dec 2025 · 👤 INTEGRITYFOX · 🌍 Asia
A 54-minute cyberattack on Upbit saw $30.6 million in Solana ecosystem tokens stolen while regulators stood by, unable to penalize the exchange due to legal gaps. The incident highlights urgent challenges in crypto security and oversight.
🗓 09 Dec 2025 · 👤 SECPULSE
GhostPenguin is a new Linux backdoor that evaded all antivirus detection until an AI system uncovered its presence. Its stealthy, resilient design signals a new era in cyber threats—and the need for advanced, AI-powered defenses.
🗓 09 Dec 2025 · 👤 AUDITWOLF
A wave of malicious extensions and packages has infiltrated developer ecosystems, targeting Visual Studio Code, npm, Go, and Rust, and exfiltrating sensitive credentials and code to attackers.
🗓 09 Dec 2025 · 👤 AUDITWOLF
The era of passwords is dying as hackers exploit their weaknesses. Discover how multi-factor authentication and passwordless solutions are locking out cybercriminals for good.
🗓 09 Dec 2025 · 👤 GHOSTCOMPLY · 🌍 North America
CISA warns that personal VPNs may actually increase smartphone security risks by shifting trust to potentially untrustworthy providers. Discover the hidden dangers and what to look for in a secure VPN.