⚡ Weekly Recap: Nation-State Hacks, Spyware Alerts, Deepfake Malware, Supply Chain Backdoors

05/05/2025 0 Comments 0 tags

What if attackers aren’t breaking in—they’re already inside, watching, and adapting? This week showed a sharp rise in stealth tactics built for long-term access and silent control. AI is being

Golden Chickens Deploy TerraStealerV2 to Steal Browser Credentials and Crypto Wallet Data

05/05/2025 0 Comments 0 tags

The threat actors known as Golden Chickens have been attributed to two new malware families dubbed TerraStealerV2 and TerraLogger, suggesting continued development efforts to fine-tune and diversify their arsenal. “TerraStealerV2

Malicious Go Modules Deliver Disk-Wiping Linux Malware in Advanced Supply Chain Attack

03/05/2025 0 Comments 0 tags

Cybersecurity researchers have discovered three malicious Go modules that include obfuscated code to fetch next-stage payloads that can irrevocably overwrite a Linux system’s primary disk and render it unbootable. The

Iranian Hackers Maintain 2-Year Access to Middle East CNI via VPN Flaws and Malware

03/05/2025 0 Comments 0 tags

An Iranian state-sponsored threat group has been attributed to a long-term cyber intrusion aimed at a critical national infrastructure (CNI) in the Middle East that lasted nearly two years. The

U.S. Charges Yemeni Hacker Behind Black Kingdom Ransomware Targeting 1,500 Systems

03/05/2025 0 Comments 0 tags

The U.S. Department of Justice (DoJ) on Thursday announced charges against a 36-year-old Yemeni national for allegedly deploying the Black Kingdom ransomware against global targets, including businesses, schools, and hospitals

TikTok Slammed With €530 Million GDPR Fine for Sending E.U. Data to China

02/05/2025 0 Comments 0 tags

Ireland’s Data Protection Commission (DPC) on Tuesday fined popular video-sharing platform TikTok €530 million ($601 million) for infringing data protection regulations in the region by transferring European users’ data to

How to Automate CVE and Vulnerability Advisory Response with Tines

02/05/2025 0 Comments 0 tags

Run by the team at workflow orchestration and AI platform Tines, the Tines library features pre-built workflows shared by security practitioners from across the community – all free to import

MintsLoader Drops GhostWeaver via Phishing, ClickFix — Uses DGA, TLS for Stealth Attacks

02/05/2025 0 Comments 0 tags

The malware loader known as MintsLoader has been used to deliver a PowerShell-based remote access trojan called GhostWeaver. “MintsLoader operates through a multi-stage infection chain involving obfuscated JavaScript and PowerShell

Microsoft Sets Passkeys Default for New Accounts; 15 Billion Users Gain Passwordless Support

02/05/2025 0 Comments 0 tags

A year after Microsoft announced passkeys support for consumer accounts, the tech giant has announced a big change that pushes individuals signing up for new accounts to use the phishing-resistant

Fake Security Plugin on WordPress Enables Remote Admin Access for Attackers

01/05/2025 0 Comments 0 tags

Cybersecurity researchers have shed light on a new campaign targeting WordPress sites that disguises the malware as a security plugin. The plugin, which goes by the name “WP-antymalwary-bot.php,” comes with