All Articles (2815)

Sort by

31050142452?profile=RESIZE_400xThe job posts do not immediately raise alarms, even though they’re clearly not for tutoring or babysitting.   “Female candidates are a PRIORITY, even if you aren’t from US, if you do not have a clear accent please feel free to inquire,” a public Telegram channel post from 15 December.  “INEXPERIENCED people are OKAY, we can train you from scratch, but we expect you to absorb information and take in what you are learning.”  Those who are interested are expected to be available from 12 pm EST to 6

 

12057871866?profile=RESIZE_400xRed Sky Alliance monthly queries our backend databases, identifying all new data containing Motor Vessel (MV) and Motor Tanker (MT) in the subject line of malicious emails.  Malicious actors use emails with Motor Vessel (MV) or Motor Tanker (MT) in the subject line as a lure to entice users in the maritime industry to open emails containing malicious attachments.  Red Sky Alliance is providing this list of Motor Vessels in which we directly observed the vessel being impersonated, with associat

31049939500?profile=RESIZE_400xThe Federal Bureau of Investigation said fraudsters in 2025 bilked Americans out of more than $333 million with ruses perpetrated by using Bitcoin ATM machines (BTM), a marked uptick over previous years as the popularity of cryptocurrencies continues to grow.

A BTM, or Bitcoin ATM, is an automated kiosk that allows individuals to buy or sell bitcoin and other cryptocurrencies using cash or debit cards.  These machines function much like traditional ATMs, but instead of dispensing cash, they faci

31052929477?profile=RESIZE_400x2025 marked yet another busy year in security, between big attacks, government shakeups, and dangerous flaws that echo of the past.  The moments that defined this year were impactful but felt evenly spread across the year.  Early in 2025, we observed the China-nexus advanced persistent threat (APT) Salt Typhoon continuing its assault against telecom companies as part of its espionage operations.  In the summer and into the fall, we saw the Cybersecurity and Infrastructure Security Agency (CISA)

31052928272?profile=RESIZE_400xEvery time a computer performs a task, an invisible conversation unfolds inside it. Numbers move between memory and processor, circuits signal one another, and layers of software exchange instructions.  These interactions feel instantaneous and effortless, yet behind the scenes, they carry a real energetic price.  For decades, scientists believed that communication inside a machine could, at least in principle, be made thermodynamically free of cost.  A new study overturns that assumption and sh

31045423676?profile=RESIZE_400xNew England is known for lobster.  But lately, it is known for the lobsters that went missing.  Thieves allegedly stole a truckload of lobster valued at $400,000 from a Massachusetts facility earlier in December.  The scheme was complex, according to Dylan Rexing, chief executive of Rexing Companies, the logistics firm that was coordinating the shipment.

The first part allegedly involved a phishing scam, and not of the seafood kind.  According to Rexing, a culprit ever-so-slightly altered the em

31045252299?profile=RESIZE_400xEvery great human leap forward has been born of fire—literal or metaphorical.  We tamed fire and warmed our caves.  We forged steel and raised skyscrapers. We cracked the atom and unleashed terrible power.  But with each advance, we danced closer to forces that could consume us.  And now, in the glow of computer screens and in the silicon minds we’ve begun to shape, some see another fire bright, burning, and perhaps uncontrollable.[1]

Artificial Intelligence.  For some, the name conjures awe and

31043733266?profile=RESIZE_400xRansomware is no longer a niche threat.  It shows up across industries, company sizes, and geographies but some groups remain far more exposed than others.  Ransomware appeared in 44% of breaches analyzed in Verizon’s 2025 DBIR executive summary, up from 32% the previous year.  This sharp rise confirms ransomware’s growing role as a primary breach driver rather than a secondary payload.[1]

Ransomware was a component of 39% of breaches in larger organizations, showing that even mature security pr

31040441252?profile=RESIZE_400xAs the digital landscape evolves, 2026 is shaping up to be a turning point for cybersecurity. AI, quantum computing and increasingly sophisticated threat actors are reshaping how both businesses and individuals think about digital risks.  Based on Vytautas Kaziukonis, a Forbes Councils Member and his experience as a founder and CEO in the cybersecurity space, he shares his views into three major cybersecurity trends shaping 2026 and what they mean for companies and users alike.[1]

  1. AI stays in

31045435098?profile=RESIZE_400xCyberVolk is a pro-Russia hacktivist persona Sentinel Labs first documented in late 2024, and it has been tracked using multiple ransomware tools to conduct attacks aligned with Russian government interests.  After seemingly lying dormant for most of 2025 due to Telegram enforcement actions, the group returned in August 2025 with a new RaaS offering called VolkLocker (aka CyberVolk 2.x).

Below, researchers examine the functionality of VolkLocker, including its Telegram-based automation, encrypti

31043722452?profile=RESIZE_400xCybersecurity researchers at ESET have uncovered a troubling new trend in cybercrime: hackers are now using AI-generated malware to intercept payments made through Near Field Communication (NFC)-enabled devices.  This advanced malware is capable of relaying sensitive payment card data, carrying out fraudulent online purchases, and even enabling unauthorized withdrawals from Automated Teller Machines (ATMs).  The discovery highlights how cybercriminals are rapidly adopting artificial intelligence

31040565899?profile=RESIZE_400xFor years, Mac users have felt a sense of security thanks to Apple’s strict notarization process, a system that ensures an app’s safety. However, a new report from Apple device security experts at Jamf Threat Labs shows that hackers are finding ways to get that official seal of approval for their own malicious tools.

Researchers were able to identify this trick while tracking a software called MacSync Stealer.  In the past, attackers relied on “clunky” tricks like drag-to-terminal or ClickFix, w

31045221678?profile=RESIZE_400xThe advanced persistent threat (APT) group known as APT31, which Western governments have linked to China's state-sponsored espionage efforts, has been attributed to a series of cyberattacks targeting Russia's information technology (IT) sector. These attacks primarily focused on companies serving as contractors and integrators for government agencies, with activity spanning from late 2022 through 2025.  Russian cybersecurity firm Positive Technologies attributed the campaign to APT31 in a Novem

31045220469?profile=RESIZE_400xCybercriminals are exploiting the implicit trust users place in central Artificial Intelligence (AI) platforms to distribute the Atomic macOS Stealer (AMOS).  A new campaign, identified by security researchers at Huntress, reveals that attackers have evolved beyond simply mimicking trusted brands; they are now actively exploiting legitimate services from OpenAI and xAI to host malicious payloads.  The campaign highlights a significant shift in social engineering tactics.  Rather than directing v

31040537873?profile=RESIZE_400xThe maritime environment is a large and integral part of the transportation supply chain.  Cyber security is now a huge factor in all the maritime segments along the way.  Below is an awareness of potential threats and vulnerabilities.

AI-enabled efficiency - Ports are some of the most dynamic and demanding security environments in the world.  Ships arrive at all hours, thousands of containers move through restricted zones daily, and multiple agencies share responsibility for safety and logistic

31040394278?profile=RESIZE_400xThe US government wants to use private firms to conduct offensive cyberattacks against foreign adversaries, potentially escalating electronic conflict, which is currently often carried out by secretive intelligence agencies.   The White House plans to make public its intention to enlist private companies in more aggressive efforts to go after criminal and state-sponsored hackers in a new national cyber strategy.  The strategy is expected to be released by the Office of the National Cyber Directo

31039540075?profile=RESIZE_400xThe past year of 2025 has seen an unprecedented number of cyber-attacks targeting large enterprises and globally recognized brands.  Among the major trends Infosecurity reported on in 2025, their analysts saw organized ransomware groups and more nebulous collectives of teenager hackers alike manage to break into systems using clever but often unsophisticated tactics.  Additionally, we saw a series of software supply chain attacks, where adversaries, spanning from low-skilled cybercriminals to na

31040384276?profile=RESIZE_400xSaint Nicholas, known as the patron saint of children and sailors, was born in the third century in the town of Patara, in present-day Turkey.  Renowned for his generosity and compassion, Nicholas dedicated his life to helping those in need, often performing acts of kindness in secret.  The most famous story tells how he tossed bags of gold through a poor family's window at night to provide dowries for three daughters, saving them from hardship.  Over time, his selfless actions inspired many, an

31040392494?profile=RESIZE_400xA sophisticated phishing toolkit named Spiderman has emerged on the dark web, enabling cybercriminals to mimic login pages of central European banks and cryptocurrency exchanges without requiring coding knowledge.  Sold as a ready-to-use package, the kit lowers barriers for fraudsters, allowing rapid deployment of deceptive campaigns that harvest sensitive credentials in real time.  Security researchers warn that such tools signal a growing democratization of cybercrime, where even novices can e

31040380055?profile=RESIZE_400xGiving businesses the freedom to do their thing while we maintain national security is much more difficult than it looks.  Two stories from last week show how much harder it is.  For two decades now, the jewels of our industry have been vanishing or turning red.  In their different ways, iRobot and ASML shed light on a crisis no one really wants to acknowledge.

Last week, iRobot filed for bankruptcy and was immediately acquired by Picea Robotics, its China-based contract manufacturer.  You may k