All Articles (2511)

Sort by

13579779679?profile=RESIZE_400xAs technological advances redefine the dynamics of modern warfare, Ukraine has emerged as a significant player in adopting cutting-edge robotics and autonomous systems for military purposes. In the context of ongoing conflicts and geopolitical tensions, the nation has turned to innovation not only to bolster its defensive capabilities but also to adapt to the challenges of asymmetric warfare.

Ukraine’s adoption of robotic technologies in military strategy reflects a shift towards modernizing its

Views: 10
Comments: 0

13579779666?profile=RESIZE_400xCybercriminals have been using AI-generated voice messages to impersonate high-ranking US government officials in an ongoing effort to breach the online accounts of current and former officials, the FBI has warned.   The FBI is issuing this announcement to warn and provide mitigation tips to the public about an ongoing malicious text and voice messaging campaign.  

“Since April 2025, malicious actors have impersonated senior US officials to target individuals, many of whom are current or former

Views: 13
Comments: 0

13579779062?profile=RESIZE_400xA Massachusetts-based ambulance billing company has agreed to pay federal regulators a $75,000 penalty and implement a corrective action plan following a 2022 ransomware breach that affected about 70 clients and nearly 586,000 people.  The U.S. Department of Health and Human Services' Office for Civil Rights said on 30 June 2025 that it had reached the settlement with Comstar LLC following the agency's investigation into the company's hacking incident looking into potential HIPAA violations.  HH

Views: 13
Comments: 0

13579778669?profile=RESIZE_400xThe longer our digital lives, the more online accounts we are likely to accrue. Can you even remember all the services you’ve signed up for over the years? It could be that free trial you started and never cancelled. Or that app you used on holiday once and never returned to. Account sprawl is real. According to one estimate, the average person has 168 passwords for personal accounts.

Inactive accounts are also a security risk, both from a personal and a work perspective. They represent a potent

Views: 8
Comments: 0

13579778466?profile=RESIZE_400xRecently, I have been receiving emails from stangers that appeared to be from Docusign for my signature, now I know why.  A new malware campaign using fake DocuSign verification pages to deploy the NetSupport Remote Access Trojan (RAT) has been uncovered. According to DomainTools, the campaign tricks users into infecting their own machines through a series of deceptive steps involving clipboard manipulation and disguised scripts.  At the core of the campaign is a spoofed DocuSign website that mi

Views: 16
Comments: 0

13570537252?profile=RESIZE_400xThe grounding of the MSC Antonia near the Eliza Shoals off Jeddah has drawn attention to the increasing risks of cyber-physical attacks in the maritime sector, particularly in the Middle East and North Africa (MENA).  Analysis by maritime intelligence firms suggest the incident may have been caused by GPS jamming that compromised the vessel's navigational systems, leading to incorrect positioning data and the subsequent grounding.

Luke Pordham, assistant vice president at Lockton MENA, highlight

13571391681?profile=RESIZE_400xCommon Vulnerabilities and Exposures (CVEs) are a top cause of cloud breaches.  Organizations often fail to patch or mitigate these known vulnerabilities.  Sometimes, it is due to gaps in visibility regarding the presence of CVEs in their cloud environments.  Often, organizations struggle to keep up with the constant stream of vulnerabilities and prioritize their remediation.  Gaps in patching both offer a foothold for targeted attacks and also empower untargeted, large-scale exploitation attemp

13571149493?profile=RESIZE_400xThe analysis from Fortinet below is part of an incident investigation led by their Incident Response Team.  Their researchers discovered malware that had been running on a compromised machine for several weeks.  The threat actor had executed a batch of scripts and PowerShell to run the malware in a Windows process.  Although obtaining the original malware executable was difficult, a memory dump of the running malware process and a full memory dump of the compromised machine (the “fullout” file,

13565836889?profile=RESIZE_400xArtificial intelligence researchers have warned that OpenAI’s latest ChatGPT model ignores basic instructions to turn itself off and even sabotaged a shutdown mechanism to keep itself running.  Remember HAL from the 2001 Space Odyssey movie?  HAL (Heuristically Programmed Algorithmic Computer) was an onboard spacecraft computer, who would not allow astronauts David Bowman and Frank Poole to disable its operation.  That was a very forward-learning look in 1968 that examined the future perils of a

13566567267?profile=RESIZE_400xIt is hard to believe that the infamous attack on the Maersk was eight (8) years ago.  This attack was one of the most notable incidents underscoring the importance of cyber security in the maritime industry is the 2017 Maersk cyber-attack. The shipping giant fell victim to the NotPetya ransomware, which essentially stopped its global operations.  The attack resulted in an estimated financial loss of $300 million and temporarily disrupted the company's ability to process shipping logistics and c

13570274669?profile=RESIZE_400xThe FBI has issued a critical alert regarding a sophisticated cyber campaign in which malicious actors are impersonating senior US officials using AI-generated voice and text messages.  According to an FBI alert, the campaign, which has been active since April 2025, primarily targets current and former federal and state government officials, as well as their contacts.

Attackers use Smishing (SMS phishing) and Vishing (voice phishing) techniques, now augmented with AI-generated content, to deceiv

12057871866?profile=RESIZE_400x

Red Sky Alliance monthly queries our backend databases, identifying all new data containing Motor Vessel (MV) and Motor Tanker (MT) in the subject line of malicious emails.  Malicious actors use emails with Motor Vessel (MV) or Motor Tanker (MT) in the subject line as a lure to entice users in the maritime industry to open emails containing malicious attachments.  Red Sky Alliance is providing this list of Motor Vessels in which we directly observed the vessel being impersonated, with associate

13570270684?profile=RESIZE_400xDutch intelligence agencies and Microsoft report that a novel Russian state intelligence hacking group is likely purchasing stolen credentials from criminal marketplaces to gain entry to North American and European networks.   In coordinated disclosure recently, the Dutch government and Microsoft stated this group of government-linked hackers has been active since 2024 and has "a specific interest in European Union and NATO member states."  Dutch agencies said the group, which they named "Laundr

13566470858?profile=RESIZE_400xIn an era defined by accelerating cyberthreats and technological disruption, founders face a complex, evolving landscape.  Regardless of industry, this is a reality for startups, whether they’re developing a first prototype, fine-tuning a go-to-market strategy or preparing to go public.  The same advances in artificial intelligence (AI), cloud computing and automation that enhance companies’ defenses are simultaneously exploited by adversaries.  On the horizon, quantum computing promises to resh

13566475869?profile=RESIZE_400xNearly 50% of consumers on both sides of the Atlantic have been targeted by social media advertising promoting retail fraud guides and services, and thinly disguised ‘refund hacks,’ according to new research from Netacea.  The UK-based cybersecurity specialist polled over 2000 consumers in the UK and US to compile its 2025 Cyberfraud in Retail report.  The study warned that fraud is increasingly normalized via high-profile ads on the surface web, designed to encourage consumers to participate in

13566489655?profile=RESIZE_400xHackers stole more than $12 million worth of cryptocurrency from the decentralized finance (DeFi) platform Cork Protocol this past week.  Company co-founder Phil Fogel said all activity on the platform has been paused.  “There was a security incident affecting the wstETH:weETH market at 11:23 UTC today.  All other Cork markets have been paused as a precaution, and no other markets have been impacted,” the company later said in a statement.  “We are actively investigating the situation and will c

13565861454?profile=RESIZE_400xChinese authorities have accused a hacker group allegedly backed by Taiwan of carrying out a cyberattack on a local technology company and targeting sensitive infrastructure across the mainland, state media reported.  According to police in Guangzhou, the group, allegedly linked to Taiwan’s ruling Democratic Progressive Party (DPP), has targeted more than 1,000 key networks in over 10 Chinese provinces, including military, energy, transportation and government systems.

Chinese authorities said t

13565898296?profile=RESIZE_400xCybersecurity researcher Jeremiah Fowler has discovered a misconfigured and unprotected database containing over 184 million unique login names and passwords.  According to Fowler’s research, shared with Hackread.com, this exposed collection amounted to approximately. 47.42 gigabytes of data.

A Massive Data Leak - The database, which lacked password protection or encryption, stored credentials for numerous online services.  These included popular email providers, major tech platforms such as Mic

13565394455?profile=RESIZE_400xAttackers continue to exploit insecure DNS configurations to hijack domain names and redirect users to malicious sites for scams, malware distribution, and other nefarious activities.  Recently, a threat actor tracked by Infoblox as "Hazy Hawk" has been leveraging a different version of the attack vector to seize control of abandoned cloud resources, such as S3 buckets and Azure endpoints, linked to prominent organizations.  Infoblox observed the threat actor using the hijacked domains to host a

13563077261?profile=RESIZE_400xThis US cyber security advisory sent through CISA highlights a Russian state-sponsored cyber campaign targeting Western logistics entities and technology companies. This includes those involved in the coordination, transport, and delivery of foreign assistance to Ukraine. Since 2022, Western logistics entities and IT companies have faced an elevated risk of targeting by the Russian General Staff Main Intelligence Directorate (GRU) 85th Main Special Service Center (85th GTsSS), military unit 2616