Intellexa’s global corporate web shows how Predator spyware survives scrutiny
Recorded Future’s Intellexa report shows how Predator spyware survives through front companies, sanctions evasion pressure, and wider targeting.
Surge in attacks on surveillance cameras linked to Iranian hackers
Iran-linked attacks on surveillance cameras show how exposed IoT devices can become high-value intelligence assets during conflict.
Project Compass targets The Com with 30 arrests across youth cybercrime network
Europol’s Project Compass hits The Com with 30 arrests, exposing how youth cybercrime networks blend social engineering, extortion and ransomware.
Russian intelligence targets messaging accounts instead of breaking encryption
CISA and the FBI warn Russian intelligence is phishing messaging app users, bypassing encryption by stealing accounts instead.
DarkSword shows how the iPhone exploit market serves surveillance operations
DarkSword highlights a commercial iPhone exploit market where spyware vendors and state actors use chained flaws for covert surveillance.
9 critical IP KVM flaws expose a dangerous new path to root access
Nine flaws in low-cost IP KVMs could give attackers unauthenticated root access and stealthy control over connected systems.
Critical GNU InetUtils telnetd flaw raises urgent questions about legacy remote access risk
A reported GNU InetUtils telnetd flaw could enable unauthenticated root RCE, putting legacy Telnet-exposed systems at serious risk.
New DarkSword iOS exploit used in infostealer attack on iPhones
A reported DarkSword iPhone campaign shows how iOS exploits and infostealers can expose personal data and crypto wallets alike.
New Perseus Android malware checks user notes for secrets
Perseus shows how Android malware can turn plain text notes into a gold mine for passwords, seed phrases, and financial secrets.
Shai-Hulud-like worm targets developers through npm and AI tools
Researchers warn a Shai-Hulud-like npm worm is targeting developers, stealing secrets, and abusing AI tooling in supply-chain attacks.
Vulnerabilities in password managers put browser trust under scrutiny
Researchers say some password managers can leak or alter credentials through browser-side flaws, challenging how users interpret encryption claims.
Fake AI assistants in Chrome Web Store steal passwords and spy on emails
Malicious AI-themed Chrome extensions are stealing passwords, hijacking sessions, and spying on email at alarming scale.











