Next-level malware represents a new era of malicious code developed specifically to get around modern security software like digital forensics tools and EDR, new research warns.
Автор: Becky Bracken, Senior Editor, Dark Reading
Chinese Hacker Group Tracked Back to iSoon APT Operation
The group, called FishMonger or Aquatic Panda, is working under contract for the Chinese government to steal data from governmental organizations, Catholic charities, NGOs, think tanks, and more.
Meet the Low-Key Access Broker Supercharging Russian State Cybercrime
Raspberry Robin breaks into organizations and sells access to Russian threat actors, including the military cyber unit behind attempted coups, assassinations, and influence operations throughout Europe.
What CISA’s Red Team Disarray Means for US Cyber Defenses
DOGE is making wild moves at CISA, including bringing back fired probationary employees only to put them on paid leave, and reportedly gutting the agency’s red teams.
TikTok’s Teen Data Use Probed by UK Regulators
Investigators at the ICO are looking into how (or if) TikTok, as well as Reddit and Imgur, are enforcing UK privacy protections for 13- to 17-year-old users.
Microsoft Busts Hackers Selling Illegal Azure AI Access
LLMjacking operation leveraged illicit access GenAI services to produce explicit celebrity images and other harmful content, Microsoft’s digital crimes unit says.
Hackers Can Crack Into Car Cameras in Minutes Flat
It’s shockingly simple to turn a car dashcam into a powerful reconnaissance tool for gathering everyday routine and location data, researchers warn.
Roundtable: Is DOGE Flouting Cybersecurity for US Data?
Cybersecurity experts weigh in on the red flags flying around the new Department of Government Efficiency’s handling of the mountains of US data it now has access to, potentially without basic information security protections in place.
Data Leaks Happen Most Often in These States — Here’s Why
State-led data privacy laws and commitment to enforcement play a major factor in shoring up business data security, an analysis shows.
AI Malware Dressed Up as DeepSeek Packages Lurk in PyPi
Adversaries looking to ride the DeepSeek interest wave are taking advantage of developers in a rush to deploy the new technology, by using AI-generated malware against them.