Threat actor allegedly sells corporate data linked to cloud file-sharing breaches
Hudson Rock says initial access was likely obtained using credentials harvested by infostealers like RedLine, Lumma, and Vidar.
Hudson Rock says initial access was likely obtained using credentials harvested by infostealers like RedLine, Lumma, and Vidar.
The campaign, dubbed ‘PHALT#BLYX,’ begins with phishing emails posing as reservation cancellations from popular hotel booking platforms.
Kimwolf is believed to be an Android variant of AISURU and may be behind a series of record-setting DDoS attacks late last year.
The group has maintained “high-intensity intelligence gathering activities” against Ukrainian institutions throughout 2025.
The attackers gained access after Trust Wallet’s developer GitHub secrets were exposed.
The operation uses social engineering and technical evasion techniques, delivering malware through trojanized HWP documents.
The latest campaign alone impacted 2.2 million users through malicious browser extensions distributed across the three major browsers.
Goldberg worked at incident response firm Sygnia, while Martin, served as a ransomware negotiator for financial technology company DigitalMint.
ensys and the Shadowserver Foundation identified roughly 87,000 and 74,854 potentially exposed systems worldwide, respectively.
In brief: Fortinet warns of a five-year-old FortiOS flaw exploited in the wild, Russian defense-industry orgs targeted in a new campaign, and more.
Showing elements 201 - 210