North Korean threat actors use JSON sites to deliver malware via trojanized code
North Korean threat actors use JSON sites to deliver malware via trojanized code Pierluigi Paganini November 17, 2025 North Korean...
North Korean threat actors use JSON sites to deliver malware via trojanized code Pierluigi Paganini November 17, 2025 North Korean...
Nov 14, 2025Ravie LakshmananMalware / Threat Intelligence The North Korean threat actors behind the Contagious Interview campaign have once again...
State-sponsored threat actors from China used artificial intelligence (AI) technology developed by Anthropic to orchestrate automated cyber attacks as part...
Nov 04, 2025Ravie LakshmananMalware / Cyber Espionage Threat actors are leveraging weaponized attachments distributed via phishing emails to deliver malware...
Nov 03, 2025Ravie LakshmananCybercrime / Supply Chain Attack Bad actors are increasingly training their sights on trucking and logistics companies...
Suspected Chinese actors compromise U.S. Telecom firm Ribbon Communications Pierluigi Paganini October 31, 2025 A nation-state actor, likely a China-nexus...
Threat researchers with cybersecurity firm Silent Push are linking bad actors with heavy ties to the Russian underworld to...
Organizations in Ukraine have been targeted by threat actors of Russian origin with an aim to siphon sensitive data and...
Oct 29, 2025Ravie LakshmananVulnerability / Malware Threat actors are actively exploiting multiple security flaws impacting Dassault Systèmes DELMIA Apriso and...
Threat actors tied to North Korea have been observed targeting the Web3 and blockchain sectors as part of twin campaigns...
Oct 24, 2025Ravie LakshmananData Breach / Cybercrime The threat actors behind a large-scale, ongoing smishing campaign have been attributed to...
Oct 23, 2025Ravie LakshmananCyber Espionage / Threat Intelligence Threat actors with ties to North Korea have been attributed to a...
Oct 22, 2025Ravie LakshmananCyber Espionage / Vulnerability Threat actors with ties to China exploited the ToolShell security vulnerability in Microsoft...
Conclusion As Lumma Stealer activity continues to decline and underground actors migrate to Vidar and StealC alternatives, security teams should...
The Chinese state-sponsored threat actors believed to be behind the high-profile hack of F5’s corporate networks reportedly infiltrated the security...