Shopping News / Articles
Fake Security Tool Spreads Lucid Rook in Taiwan Cyberattacks
5+ hour, 26+ min ago (728+ words) Hackers are using fake security tools and cleverly crafted phishing emails to secretly deploy a new malware family, Lucid Rook, against organizations in Taiwan. The campaign, tracked as UAT-10362, focuses on Taiwanese NGOs and likely universities and shows a high…...
UK NCSC says APT28 exploits routers for DNS hijacking, enabling large-scale traffic interception
6+ hour, 33+ min ago (258+ words) We assess that APT28 is almost certainly the Russian General Staff Main Intelligence Directorate (GRU) 85th Main Special Service Centre (GTs SS) Military Intelligence Unit 26165," the agency said in its Tuesday advisory. APT28 (also known as Forest Blizzard, Fancy Bear, STRONTIUM, the Sednit…...
Singapore Cyber Security Agency chief: Cyber stability a necessity, not a luxury
5+ hour, 46+ min ago (529+ words) As the post-Second World War rules-based order frays and geopolitical tensions spill over into the digital realm, maintaining stability in cyber space is no longer just an ideal, but an absolute necessity for modern life, said Singapore's cyber security chief,…...
APT28 Builds Two-Tier Spy Network From Home Routers to Intercept Western Government Traffic " SOFX
10+ hour, 39+ min ago (425+ words) The campaign has been active since at least August 2025, Microsoft Threat Intelligence confirmed. APT28 targets poorly secured SOHO devices, the everyday routers used in homes and remote workplaces, to silently redirect network traffic through Russian military intelligence-controlled servers. The group hijacks…...
Russia-linked APT28 uses PRISMEX to infiltrate Ukraine and allied infrastructure with advanced tactics
18+ hour, 35+ min ago (607+ words) Project Glasswing powered by Claude Mythos: defending software before hackers do Attackers exploit critical Flowise flaw CVE-2025-59528 for remote code execution Major outage cripples Russian banking apps and metro payments nationwide Fast-moving Storm-1175 uses new exploits to breach networks and…...
Estonia Foils Russian Hacker Espionage Targeting Routers - Oj
19+ hour, 24+ min ago (193+ words) Cyber specialists from Estonia's Internal Security Service (Ka Po) have uncovered and stopped a large-scale espionage operation by Russian hackers targeting Estonian internet users through compromised routers, the agency reported, as reported by Ka Po press service. The agency noted…...
Russia's GRU exploits vulnerable routers to steal sensitive data, Western intelligence warns
1+ day, 2+ hour ago (141+ words) Decoding the news. Western intelligence agencies have issued a rare joint cybersecurity warning over a large-scale espionage campaign attributed to APT28, the hacking group linked to Russia's military intelligence agency, the GRU, accusing Moscow of exploiting vulnerable routers worldwide to infiltrate…...
APT28 Deploys PRISMEX Malware in Campaign Targeting Ukraine and NATO Allies
1+ day, 1+ hour ago (492+ words) The Russian threat actor known'as APT28 (aka Forest Blizzard and Pawn Storm) has been linked to a fresh spear-phishing campaign targeting Ukraine and its allies to deploy a previously undocumented malware suite'codenamed PRISMEX. "PRISMEX combines advanced steganography, component object model (COM)…...
Finnish security services join FBI-led operation to protect home routers vulnerable to Russian espionage
1+ day, 3+ hour ago (106+ words) Telecompaper Finnish security services join FBI-led operation to protect home routers vulnerable to Russian espionage "Finland's National Cyber Security Centre (NCSC-FI or Kyberturvallisuuskeskus) and the Finnish Security and Intelligence Service (Suojelupoliisi or Supo) have warned members of the public that…...
A hacker has allegedly breached one of China's supercomputers and is attempting to sell a trove of stolen data
1+ day, 10+ hour ago (956+ words) (CNN) " A hacker has allegedly stolen a massive trove of sensitive data " including highly classified defense documents and missile schematics " from a state-run Chinese supercomputer in what could potentially constitute the largest known heist of data from China. The dataset,…...
Shopping
Please enter a search for detailed shopping results.