All Articles (2691)

Sort by

13746688859?profile=RESIZE_400xAlarming new data reveals a 300% spike in online searches for "pig butchering scams" over the past month, coinciding with WhatsApp's removal of more than 6.8 million accounts suspected of ties to these sophisticated global fraud rings in August.  Considered to be one of the world's most profitable criminal rackets, pig butchering operations are projected to have netted $12.4 billion this year alone, with victims worldwide losing an estimated $75 billion across the last four years.  Forex experts

13744077460?profile=RESIZE_400xTechnology company Cisco is being asked to answer a series of questions about a security incident that prompted emergency directives from the federal government last month.  US Senator Bill Cassidy wrote to Cisco CEO Chuck Robbins about CVE-2025-30333 and CVE-2025-20362, vulnerabilities that caused alarm three weeks ago when federal civilian agencies were given just one day to address them.  Cassidy, who is the chairman of the Committee on Health, Education, Labor, and Pensions, noted that “at l

13746622676?profile=RESIZE_400xThe United States federal government has ended its longstanding support for the Multi-State Information Sharing and Analysis Center (MS-ISAC), a trusted program for sharing cyber threat intelligence that state and local governments have relied on for years.  The US Cybersecurity and Infrastructure Security Agency (CISA) confirmed that its cooperative agreement with the Center for Internet Security (CIS) the nonprofit that runs MS-ISAC expired on 30 September 2025.  With federal funding now cut,

13745260700?profile=RESIZE_400xNorwegian officials are looking into a potential cybercrime after they noticed a massive surge in betting activity on this year's Nobel Peace Prize winner, several hours before the official announcement was made.  The convenient timing, coupled with the sheer amount of money wagered, means the Norwegian Nobel Institute is treating it as a possible case of espionage.

Before the big announcement, the Polymarket prediction platform had Venezuelan opposition leader Maria Corina Machado's odds of win

13744060882?profile=RESIZE_400xCISA is directing Federal Civilian Executive Branch (FCEB) agencies to inventory F5 BIG-IP products, evaluate if the networked management interfaces are accessible from the public internet, and apply updates from F5. 

A nation-state affiliated cyber threat actor has compromised F5’s systems and exfiltrated files, which included a portion of its BIG-IP source code and vulnerability information.  The threat actor’s access to F5’s proprietary source code could provide that threat actor with a techn

13743540653?profile=RESIZE_400xA recent Cobalt report found that 68% of security leaders are concerned about the risks of third-party software tools and components introduced across their tech stacks. Seventy-three percent reported receiving at least one notification of a software supply chain vulnerability or incident in the past year.

According to the report, 60% believe attackers are evolving too quickly to maintain a truly resilient security posture and 46% are uneasy about AI-driven features and large language models.  S

13741528262?profile=RESIZE_400xScouting America, the organization formerly known as the Boy Scouts, is giving scouts the chance to earn two merit badges that engage new technology: one in artificial intelligence, and another in cybersecurity.

The organization, which counts about a million scouts in its ranks, offers hundreds of merit badges spanning everything from fishing to fingerprinting.  The badges have long presented scouts with the opportunity to sharpen skills and explore new subjects.[1]

Scouting America is adding th

13744095071?profile=RESIZE_400xIn 2025, Chaos ransomware resurfaced with a C++ variant.  This marks the first time it was not written in .NET.  Beyond encryption and ransom demands, it adds destructive extortion tactics and clipboard hijacking for cryptocurrency theft.  This evolution underscores Chaos's shift toward more aggressive methods, amplifying both its operational impact and the financial risk it poses to victims.

This Fortinet report provides a comprehensive technical analysis of Chaos-C++, covering its execution fl

13744071275?profile=RESIZE_180x180Asahi has confirmed it has been the victim of a ransomware attack, resulting in an “unauthorized transfer of data” from its servers.  The Japanese brewing company provided an update on 3 October 2025, one week after disclosing that it had been targeted by a cyberattack, which forced it to suspend some domestic operations in Japan.  The company established an Emergency Response Headquarters to investigate the incident, which discovered that the attack was related to ransomware.

“Subsequent invest

13743508052?profile=RESIZE_400xCybersecurity researchers have shed light on a Chinese-speaking cybercrime group, codenamed UAT-8099, which has been linked to search engine optimization (SEO) fraud and the theft of high-value credentials, configuration files, and certificate data.  The attacks are designed to target Microsoft Internet Information Services (IIS) servers, with most infections reported in India, Thailand, Vietnam, Canada, and Brazil, affecting universities, tech firms, and telecom providers. The group was first d

13741508494?profile=RESIZE_400xUntil recently, Tim Haugh was among America's top spymasters. The four-star general spent 33 years in Air Force Intelligence and rose to lead America's largest and most advanced intelligence agency.  Haugh was also in charge of defending America from computer threats.  In his first television interview since retirement, General Haugh is here to warn that China has hacked into US computer networks to an astonishing degree.  And he believes he knows why.  The surprise, Tim Haugh told us, is that C

Cybersecurity firm Cyfirma has recently published a detailed analysis of a new ransomware strain named Yurei, which has quickly gained attention due to its speed, stealth capabilities, and the irreversible damage it inflicts.  Discovered in September 2025, Yurei is a sophisticated Go-based cyber threat designed to intimidate and disable its targets with advanced encryption and cunning operational tactics.  Yurei’s encryption mechanism employs a combination of ChaCha20 and ECIES (Elliptic Curve I

13741561688?profile=RESIZE_400xThe Clop ransomware gang has been exploiting a critical Oracle E-Business Suite (EBS) zero-day bug in data theft attacks since at least early August 2025, according to cybersecurity company CrowdStrike.  Tracked as CVE-2025-61882 and patched by Oracle on 01 October 2025, this vulnerability was discovered in the BI Publisher Integration component of Oracle EBS's Concurrent Processing component, allowing unauthenticated attackers to gain remote code execution on unpatched systems in low-complexity

13741101876?profile=RESIZE_400xA Vietnamese threat actor named BatShadow has been attributed to a new campaign that leverages social engineering tactics to deceive job seekers and digital marketing professionals to deliver a previously undocumented malware called Vampire Bot.   "The attackers pose as recruiters, distributing malicious files disguised as job descriptions and corporate documents," Aryaka Threat Research Labs researchers Aditya K Sood and Varadharajan K said in a report shared with The Hacker News. "When opened,

13739187271?profile=RESIZE_400xJaguar Land Rover (JLR) announced on 7 October it will begin the phased restart of its manufacturing operations following a cyber-attack that completely halted global production last month.  Separately, the company said it was launching a financing scheme to provide some of its suppliers with up-front cash to help them overcome the financial difficulties caused by the shutdown.[1]  The impact to JLR’s supply chain caused what one senior British politician called “a cyber shockwave ripping throug

12057871866?profile=RESIZE_400x

Red Sky Alliance monthly queries our backend databases, identifying all new data containing Motor Vessel (MV) and Motor Tanker (MT) in the subject line of malicious emails.  Malicious actors use emails with Motor Vessel (MV) or Motor Tanker (MT) in the subject line as a lure to entice users in the maritime industry to open emails containing malicious attachments.  Red Sky Alliance is providing this list of Motor Vessels in which we directly observed the vessel being impersonated, with associate

13735921888?profile=RESIZE_400xA transnational operation involving 14 African countries has dismantled a large-scale digital scamming network, resulting in 260 arrests and the seizure of 1,235 electronic devices.  The Interpol-led effort, named Operation Contender 3.0, marks the third wave of arrests against fraudsters and romance scammers in Africa following operations in 2021 and 2024.  This third crackdown was conducted between July 28 and August 11, 2025.  It focused on romance scams, where perpetrators build online relat

13736605480?profile=RESIZE_400xGamers and game developers worldwide are being warned of an urgent need to update their software following the disclosure of a vulnerability in the Unity engine, the world’s most popular games development tool.  The bug, tracked as CVE-2025-59489, exposes apps built using affected versions of Unity to attacks that could execute arbitrary code; meaning a malicious file could hijack permissions granted to a Unity game and run commands using the app’s permissions on a victim’s device.[1]  The compa

13736579852?profile=RESIZE_400xSoftware giant Oracle confirmed reports that dozens of its customers have received extortion emails from cybercriminals demanding payment in exchange for not releasing troves of stolen information.  In a statement published last week, Oracle chief security officer Rob Duhart said they are investigating claims made by the Clop ransomware gang that there was a breach of some Oracle E-Business Suite customers.  “Our ongoing investigation has found the potential use of previously identified vulnerab

13736646684?profile=RESIZE_400xThe Confucius group is a long-running cyber-espionage actor operating primarily across South Asia.  First identified in 2013, the group is believed to have links to state-sponsored operations in the region.  Over the past decade, Confucius has repeatedly targeted government agencies, military organizations, defense contractors, and critical industries, especially in Pakistan, using spear-phishing and malicious documents as initial access vectors.  Recent campaigns have highlighted a sharp evolut