Hacking
    FBI warns about Kimsuky hackers using QR codes to phish U.S. orgs
    January 8, 2026   05:57 PM   0 The North Korean state-sponsored hacker group Kimsuki is using malicious QR codes in spearphishing campaigns that target U.S. organizations, the Federal Bureau of Investigation warns in a flash alert. The observed activity targets organizations involved in North Korea-related policy, research, and analysis, including non-governmental organizations, think tanks, academic institutions, strategic advisory firms, and government...
    By Charles Norton 2026-01-09 15:42:46 0 181
    Hacking
    In 2026, Hackers Want AI: Threat Intel on Vibe Hacking & HackGPT
    January 7, 2026   10:00 AM   0 Right now, across , channels, and underground , hackers are talking about artificial intelligence - but not in the way most people expect. They aren’t debating how models work. They aren’t gasping with awe about the latest generative AI movie models. They aren’t arguing about whether AI will replace humans or not. Instead, they’re treating AI as something far more powerful: a shortcut to...
    By Charles Norton 2026-01-07 18:02:01 0 201
    Hacking
    Hackers claim to hack Resecurity, firm says it was a honeypot
    January 3, 2026   03:34 PM   1 Update: Article updated to reflect that the ShinyHunters says they were not involved in this activity. We have updated our story and title. Threat actors associated with the "Scattered Lapsus$ Hunters" (SLH) claim to have breached the systems of cybersecurity firm Resecurity and stolen internal data, while Resecurity says the attackers only accessed a deliberately deployed honeypot containing fake information used to monitor...
    By Charles Norton 2026-01-05 18:48:06 0 250
    Hacking
    Trust Wallet confirms extension hack led to $7 million crypto theft
    December 26, 2025   04:47 AM   1 Trust Wallet confirmed that a compromised Chrome extension update released on December 24 led to $7 million in stolen cryptocurrency after users reported their wallets drained. "So far, $7m affected by this hack. TrustWallet will cover. User funds are SAFU. Appreciate your understanding for any inconveniences caused," posted Binance founder Changpeng "CZ" Zhao on X. "The team is still investigating how...
    By Charles Norton 2025-12-28 19:40:22 0 213
    Hacking
    Hacker claims to leak WIRED database with 2.3 million records
    December 28, 2025   12:57 PM   0 A hacker claims to have breached Condé Nast and leaked an alleged WIRED database containing more than 2.3 million subscriber records, while also warning that they plan to release up to 40 million additional records for other Condé Nast properties. On December 20, a threat actor using the name "Lovely" leaked the database on a hacking forum, offering access for approximately $2.30 in the site's credits system. In...
    By Charles Norton 2025-12-28 19:35:09 0 218
    Hacking
    Trust Wallet confirms extension hack led to $7 million crypto theft
    December 26, 2025   04:47 AM   0 Trust Wallet confirmed that a compromised Chrome extension update released on December 24 led to $7 million in stolen cryptocurrency after users reported their wallets drained. "So far, $7m affected by this hack. TrustWallet will cover. User funds are SAFU. Appreciate your understanding for any inconveniences caused," posted Binance founder Changpeng "CZ" Zhao on X. "The team is still investigating how...
    By Charles Norton 2025-12-26 16:51:17 0 198
    Hacking
    APT37 hackers abuse Google Find Hub in Android data-wiping attacks
    November 10, 2025   07:46 PM   0 North Korean hackers are abusing Google’s Find Hub tool to track the GPS location of their targets and remotely reset Android devices to factory settings. The attacks are primarily targeting South Koreans, and start by approaching the potential victims over KakaoTalk messenger - the most popular instant messaging app in the country. South Korean cybersecurity solutions company Genians links the malicious activity to...
    By Charles Norton 2025-11-11 17:48:16 0 286
    Hacking
    Hackers exploit critical auth bypass flaw in JobMonster WordPress theme
    November 4, 2025   02:49 AM   0 Threat actors are targeting a critical vulnerability in the JobMonster WordPress theme that allows hijacking of administrator accounts under certain conditions. The malicious activity was detected by Wordfence, a WordPress security firm, after blocking multiple exploit attempts against its clients over the past 24 hours. JobMonster, created by NooThemes, is a premium WordPress theme used by job listing sites, recruitment/hiring...
    By Charles Norton 2025-11-04 16:55:24 0 206
    Hacking
    China-linked hackers exploited Lanscope flaw as a zero-day in attacks
    November 1, 2025   10:16 AM   0 China-linked cyber-espionage actors tracked as 'Bronze Butler' (Tick) exploited a Motex Lanscope Endpoint Manager vulnerability as a zero-day to deploy an updated version of their Gokcpdoor malware. The discovery of this activity comes from Sophos researchers, who observed the threat actors exploiting the vulnerability in mid-2025 before it was patched to steal confidential information. The flaw exploited in these attacks...
    By Charles Norton 2025-11-02 18:57:03 0 270
    Hacking
    Hackers steal Discord accounts with RedTiger-based infostealer
    October 26, 2025   10:26 AM   0 Attackers are using the open-source red-team tool RedTiger to build an infostealer that collects Discord account data and payment information. The malware can also steal credentials stored in the browser, cryptocurrency wallet data, and game accounts. RedTiger is a Python-based penetration testing suite for Windows and Linux that bundles options for scanning networks and cracking passwords, OSINT-related utilities,...
    By Charles Norton 2025-10-27 16:20:56 0 272
    Hacking
    Hackers earn $1,024,750 for 73 zero-days at Pwn2Own Ireland
    October 24, 2025   02:36 AM   0 ​The Pwn2Own Ireland 2025 hacking competition has ended with security researchers collecting $1,024,750 in cash awards after exploiting 73 zero-day vulnerabilities. At Pwn2Own Ireland 2025, competitors targeted products in eight categories, including printers, network storage systems, messaging apps, smart home devices, surveillance equipment, home networking equipment, flagship smartphones (Apple iPhone 16,...
    By Charles Norton 2025-10-24 16:29:46 0 339
More Blogs
Read More
Security
Coupang to split $1.17 billion among 33.7 million data breach victims
December 29, 2025   05:27 PM   0 Coupang, the largest retailer in...
By Charles Norton 2025-12-30 17:05:06 0 244
Crypto
US govt seizes $1 million in crypto from BlackSuit ransomware gang
August 12, 2025   12:18 PM   0 The U.S. Department of Justice...
By Charles Norton 2025-08-12 18:24:34 0 658
Crypto
FBI takes down BreachForums portal used for Salesforce extortion
October 10, 2025   04:24 AM   0 The FBI seized a BreachForums...
By Charles Norton 2025-10-11 18:21:18 0 284
Security
Open VSX rotates tokens used in supply-chain malware attack
November 2, 2025   10:09 AM   0 The Open VSX registry rotated...
By Charles Norton 2025-11-02 18:50:14 0 259
Ransomware
UK to ban public sector orgs from paying ransomware gangs
July 22, 2025   09:01 AM   6 The United Kingdom's government is...
By Charles Norton 2025-07-22 18:33:20 0 763