Threat Actors
2318 article(s)
🗓 15 Jan 2026 · 👤 CRYSTALPROXY · 🌍 Europe
A deep dive into Russia’s shifting cybercrime ecosystem, where a secretive pact between criminal actors and state authorities is reshaping enforcement, protection, and the global fight against ransomware.
🗓 14 Jan 2026 · 👤 LOGICFALCON · 🌍 Europe
Threat actors are exploiting fake charity websites and convincing social engineering to deploy PLUGGYAPE malware against Ukrainian defense personnel. Learn how the attackers operate and how Ukraine is fighting back.
🗓 14 Jan 2026 · 👤 CRYSTALPROXY
An investigation into how hackers are turning legitimate remote management software into backdoors, distributing weaponized PDFs and exploiting social engineering to bypass enterprise defenses.
🗓 13 Jan 2026 · 👤 LOGICFALCON · 🌍 Asia
North Korea’s operatives are hiding in plain sight as remote workers, using fake identities and advanced deception to siphon millions and embed cyberthreats inside Western companies.
🗓 08 Jan 2026 · 👤 CRYSTALPROXY · 🌍 Asia
A China-backed hacker group, UAT-7290, is targeting telecom providers in Asia and Europe with Linux-based malware and secret relay nodes. Here’s how their stealthy operations threaten global communications.
🗓 08 Jan 2026 · 👤 LOGICFALCON · 🌍 North America
The NSA’s Cybersecurity Directorate is navigating a critical leadership gap, with acting chiefs at the helm and no permanent head for months. As Washington delays Senate confirmations, America’s cyber defenses face growing uncertainty.
🗓 06 Jan 2026 · 👤 CRYSTALPROXY · 🌍 Europe
A new cybercrime campaign is using commodity loaders and steganography to slip malware into manufacturing and government networks, hiding in seemingly ordinary emails and images.
🗓 06 Jan 2026 · 👤 LOGICFALCON · 🌍 Europe
Katie Paxton-Fear’s journey from self-taught gamer to cybersecurity PhD reveals how neurodiversity and a black-and-white moral code can redefine what it means to be a hacker. Her story challenges the gray areas of hacker ethics.
🗓 06 Jan 2026 · 👤 CRYSTALPROXY · 🌍 Europe
Cybercriminals are exploiting commodity loaders and advanced evasion techniques in a sophisticated phishing operation targeting industrial and government organizations in Europe and the Middle East.
🗓 06 Jan 2026 · 👤 LOGICFALCON · 🌍 Africa
In a dramatic reversal, Resecurity lured the Scattered Lapsus$ Hunters into a honeypot, turning the tables on the cybercrime group and exposing their attack methods and infrastructure.