All Articles (2884)

Sort by

31059808679?profile=RESIZE_400xIn a bold military exploit on 3 January 2026, US forces captured Venezuelan President Nicolás Maduro in Caracas, employing sophisticated cyber tactics to disable key infrastructure and facilitate the raid.  The operation, named Absolute Resolve, involved coordinated efforts across cyber, space, and conventional domains, resulting in Maduro's arrest on charges of drug-trafficking and terrorism.  President Donald Trump confirmed the use of cyber capabilities to induce a blackout in the capital, al

31059809059?profile=RESIZE_400xIn 2025, the cybersecurity landscape revealed a pattern of opportunistic attacks exploiting familiar weaknesses, from unpatched devices to misconfigured cloud services. Criminal groups fragmented under pressure from law enforcement, while state actors amplified their reach through emerging tools.  Geopolitical tensions fueled targeted operations, with Russia focusing on Europe and Ukraine, and China expanding influence in Africa and South America.  Overall, the year saw a shift towards data thef

31059757098?profile=RESIZE_400xA federal judge in New York has affirmed an order compelling OpenAI to produce 20 million anonymized ChatGPT interaction logs in a consolidated copyright infringement case, according to a Bloomberg report.  The decision, issued on 5 January 2026, marks a setback for the AI company amid ongoing litigation over the use of copyrighted material in its model training. The ruling stems from multidistrict litigation involving 16 lawsuits against OpenAI, brought by news organizations including The New Y

31054530668?profile=RESIZE_400xKrebs on Security first story of 2026 revealed how a destructive new botnet called Kimwolf has infected more than two million devices by mass-compromising a vast number of unofficial Android TV streaming boxes.[1]  Today, we’ll dig through digital clues left behind by the hackers, network operators and services that appear to have benefitted from Kimwolf’s spread.

On 17 December 2025, the Chinese security firm XLab published a deep dive on Kimwolf, which forces infected devices to participate in

31054486293?profile=RESIZE_400xBlockchain investigation firm TRM Labs says ongoing cryptocurrency thefts have been traced to the 2022 LastPass breach, with attackers draining wallets years after encrypted vaults were stolen and laundering the crypto through Russian exchanges.   In 2022, LastPass disclosed that attackers breached its systems by compromising a developer environment, stealing portions of the company's source code and proprietary technical information.[1]

In a later, but related security incident, the hackers bre

31052163291?profile=RESIZE_400xAs the digital landscape continues to evolve, so too do the threats that organizations must contend with.  In this year's final Reporter's Notebook conversation, cybersecurity experts Rob Wright from Dark Reading, David Jones from Cybersecurity Dive, and Alissa Irei from Tech Target Search Security share their insights on what the future holds for cybersecurity in 2026.  Drawing from AI-summarized industry reports and expert opinions, the conversation highlights key trends, challenges, and oppor

31050168091?profile=RESIZE_400x2026 is a pivotal juncture for cyber security.  What was once considered an operational safety net and a business cost item is now a determinant of long-term competitiveness, market confidence, and organizational resilience.  The data unequivocally indicates that cyber danger is systemic rather than episodic.

Cybersecurity Ventures estimates that cybercrime lost $10.5 trillion in 2025, making it a major global economic driver.  Cybercrime To Cost The World $12.2 Trillion Annually By 2031. The av

31053915075?profile=RESIZE_400xSecuronix threat researchers have been tracking a stealthy campaign targeting the hospitality sector that uses click-fix social engineering, fake captchas, and fake blue screens of death to trick users into pasting malicious code.  It leverages a trusted MSBuid.exe tool to bypass defenses and deploys a stealthy, Russian-linked DCRat payload for full remote access and the ability to drop secondary payloads.[1]

An ongoing malware campaign tracked as PHALT#BLYX has been identified as a multi-stage

31053861300?profile=RESIZE_400xTwo US cybersecurity professionals, Ryan Goldberg and Kevin Martin, pleaded guilty to charges tied to their roles in BlackCat/Alphv ransomware attacks that occurred in 2023.  Court records show that Ryan Goldberg, Kevin Martin, and a co-conspirator deployed ALPHV BlackCat ransomware against US victims from April to December 2023, sharing 20% of the ransoms with the operators.  Despite working in cybersecurity, they extorted about $1.2M in Bitcoin from one victim, split the proceeds, and laundere

31050142452?profile=RESIZE_400xThe job posts do not immediately raise alarms, even though they’re clearly not for tutoring or babysitting.   “Female candidates are a PRIORITY, even if you aren’t from US, if you do not have a clear accent please feel free to inquire,” a public Telegram channel post from 15 December.  “INEXPERIENCED people are OKAY, we can train you from scratch, but we expect you to absorb information and take in what you are learning.”  Those who are interested are expected to be available from 12 pm EST to 6

 

12057871866?profile=RESIZE_400xRed Sky Alliance monthly queries our backend databases, identifying all new data containing Motor Vessel (MV) and Motor Tanker (MT) in the subject line of malicious emails.  Malicious actors use emails with Motor Vessel (MV) or Motor Tanker (MT) in the subject line as a lure to entice users in the maritime industry to open emails containing malicious attachments.  Red Sky Alliance is providing this list of Motor Vessels in which we directly observed the vessel being impersonated, with associat

31049939500?profile=RESIZE_400xThe Federal Bureau of Investigation said fraudsters in 2025 bilked Americans out of more than $333 million with ruses perpetrated by using Bitcoin ATM machines (BTM), a marked uptick over previous years as the popularity of cryptocurrencies continues to grow.

A BTM, or Bitcoin ATM, is an automated kiosk that allows individuals to buy or sell bitcoin and other cryptocurrencies using cash or debit cards.  These machines function much like traditional ATMs, but instead of dispensing cash, they faci

31052929477?profile=RESIZE_400x2025 marked yet another busy year in security, between big attacks, government shakeups, and dangerous flaws that echo of the past.  The moments that defined this year were impactful but felt evenly spread across the year.  Early in 2025, we observed the China-nexus advanced persistent threat (APT) Salt Typhoon continuing its assault against telecom companies as part of its espionage operations.  In the summer and into the fall, we saw the Cybersecurity and Infrastructure Security Agency (CISA)

31052928272?profile=RESIZE_400xEvery time a computer performs a task, an invisible conversation unfolds inside it. Numbers move between memory and processor, circuits signal one another, and layers of software exchange instructions.  These interactions feel instantaneous and effortless, yet behind the scenes, they carry a real energetic price.  For decades, scientists believed that communication inside a machine could, at least in principle, be made thermodynamically free of cost.  A new study overturns that assumption and sh

31045423676?profile=RESIZE_400xNew England is known for lobster.  But lately, it is known for the lobsters that went missing.  Thieves allegedly stole a truckload of lobster valued at $400,000 from a Massachusetts facility earlier in December.  The scheme was complex, according to Dylan Rexing, chief executive of Rexing Companies, the logistics firm that was coordinating the shipment.

The first part allegedly involved a phishing scam, and not of the seafood kind.  According to Rexing, a culprit ever-so-slightly altered the em

31045252299?profile=RESIZE_400xEvery great human leap forward has been born of fire—literal or metaphorical.  We tamed fire and warmed our caves.  We forged steel and raised skyscrapers. We cracked the atom and unleashed terrible power.  But with each advance, we danced closer to forces that could consume us.  And now, in the glow of computer screens and in the silicon minds we’ve begun to shape, some see another fire bright, burning, and perhaps uncontrollable.[1]

Artificial Intelligence.  For some, the name conjures awe and

31043733266?profile=RESIZE_400xRansomware is no longer a niche threat.  It shows up across industries, company sizes, and geographies but some groups remain far more exposed than others.  Ransomware appeared in 44% of breaches analyzed in Verizon’s 2025 DBIR executive summary, up from 32% the previous year.  This sharp rise confirms ransomware’s growing role as a primary breach driver rather than a secondary payload.[1]

Ransomware was a component of 39% of breaches in larger organizations, showing that even mature security pr

31040441252?profile=RESIZE_400xAs the digital landscape evolves, 2026 is shaping up to be a turning point for cybersecurity. AI, quantum computing and increasingly sophisticated threat actors are reshaping how both businesses and individuals think about digital risks.  Based on Vytautas Kaziukonis, a Forbes Councils Member and his experience as a founder and CEO in the cybersecurity space, he shares his views into three major cybersecurity trends shaping 2026 and what they mean for companies and users alike.[1]

  1. AI stays in

31045435098?profile=RESIZE_400xCyberVolk is a pro-Russia hacktivist persona Sentinel Labs first documented in late 2024, and it has been tracked using multiple ransomware tools to conduct attacks aligned with Russian government interests.  After seemingly lying dormant for most of 2025 due to Telegram enforcement actions, the group returned in August 2025 with a new RaaS offering called VolkLocker (aka CyberVolk 2.x).

Below, researchers examine the functionality of VolkLocker, including its Telegram-based automation, encrypti

31043722452?profile=RESIZE_400xCybersecurity researchers at ESET have uncovered a troubling new trend in cybercrime: hackers are now using AI-generated malware to intercept payments made through Near Field Communication (NFC)-enabled devices.  This advanced malware is capable of relaying sensitive payment card data, carrying out fraudulent online purchases, and even enabling unauthorized withdrawals from Automated Teller Machines (ATMs).  The discovery highlights how cybercriminals are rapidly adopting artificial intelligence