π Ukraine confirms suspected APT28 campaign targeting prosecutors and anti-corruption agencies
Ukraine's CERT-UA confirms a Russian APT28 campaign used Roundcube webmail exploits to spy on prosecutors and anti-corruption officials.
π· Nation State
π Read full article on NewsNukem
Ukraine's CERT-UA confirms a Russian APT28 campaign used Roundcube webmail exploits to spy on prosecutors and anti-corruption officials.
π· Nation State
π Read full article on NewsNukem
π€ Vulnerability in Cursor AI allowed remote takeover of developer machines
A multi-stage flaw in the Cursor AI IDE could be triggered by opening a malicious file, leading to remote code execution and full system access.
π· Ai Security
π Read full article on NewsNukem
A multi-stage flaw in the Cursor AI IDE could be triggered by opening a malicious file, leading to remote code execution and full system access.
π· Ai Security
π Read full article on NewsNukem
π Crypto exchange Grinex blames Western spies for $13m theft
Russian crypto-exchange Grinex claims Western intelligence was behind a $13m heist, but a lack of evidence has drawn skepticism from security experts.
π· Nation State
π Read full article on NewsNukem
Russian crypto-exchange Grinex claims Western intelligence was behind a $13m heist, but a lack of evidence has drawn skepticism from security experts.
π· Nation State
π Read full article on NewsNukem
π FISA Section 702 renewed for two years after contentious congressional battle
A contentious legislative battle ends with a two-year renewal of the controversial FISA Section 702 surveillance program, side-stepping major privacy
π· Privacy
π Read full article on NewsNukem
A contentious legislative battle ends with a two-year renewal of the controversial FISA Section 702 surveillance program, side-stepping major privacy
π· Privacy
π Read full article on NewsNukem
π Anatomy of a deception: How a fake Ukraine war headline reveals a timeless cyber threat
A fake Reddit headline about the Ukraine war reveals a classic social engineering tactic. Learn how threat actors use deception and how to stay safe.
π· Nation State
π Read full article on NewsNukem
A fake Reddit headline about the Ukraine war reveals a classic social engineering tactic. Learn how threat actors use deception and how to stay safe.
π· Nation State
π Read full article on NewsNukem
π€ A hypothetical design flaw in an AI protocol reveals real-world supply chain threats
A deep dive into a hypothetical AI vulnerability that reveals real-world threats to the AI supply chain, from remote code execution to systemic compro
π· Ai Security
π Read full article on NewsNukem
A deep dive into a hypothetical AI vulnerability that reveals real-world threats to the AI supply chain, from remote code execution to systemic compro
π· Ai Security
π Read full article on NewsNukem
π Ukraine's robotic army: Analyzing the cyber attack surface of 25,000 frontline UGVs
Ukraine's plan to deploy 25,000 ground robots is a strategic masterstroke, but it creates a vast new cyber attack surface vulnerable to hacking and EW
π· Nation State
π Read full article on NewsNukem
Ukraine's plan to deploy 25,000 ground robots is a strategic masterstroke, but it creates a vast new cyber attack surface vulnerable to hacking and EW
π· Nation State
π Read full article on NewsNukem
π€ Elon Musk fails to appear for questioning by French police over sexualized AI images on X
An analysis of the French investigation into X over AI-generated child abuse images, and why the non-appearance of its top executives signals a seriou
π· Ai Security
π Read full article on NewsNukem
An analysis of the French investigation into X over AI-generated child abuse images, and why the non-appearance of its top executives signals a seriou
π· Ai Security
π Read full article on NewsNukem
β οΈ ZionSiphon malware targets water infrastructure systems with sabotage capabilities
A deep dive into ZionSiphon, a new malware targeting water systems with sabotage capabilities, and how utilities can defend against this critical thre
π· Vulnerabilities
π Read full article on NewsNukem
A deep dive into ZionSiphon, a new malware targeting water systems with sabotage capabilities, and how utilities can defend against this critical thre
π· Vulnerabilities
π Read full article on NewsNukem
π Anatomy of a heist: How North Korean hackers allegedly stole $290 million in crypto this year
A series of 2023 crypto heists totaling $290M has been linked to North Korea's Lazarus Group, exposing critical vulnerabilities in the DeFi space.
π· Data Breaches
π Read full article on NewsNukem
A series of 2023 crypto heists totaling $290M has been linked to North Korea's Lazarus Group, exposing critical vulnerabilities in the DeFi space.
π· Data Breaches
π Read full article on NewsNukem
π The anatomy of a phantom menace: Why a hypothetical Axios attack is a real warning for supply chain security
A hypothetical attack on the Axios library serves as a stark warning about real-world software supply chain vulnerabilities and makes a compelling cas
π· Nation State
π Read full article on NewsNukem
A hypothetical attack on the Axios library serves as a stark warning about real-world software supply chain vulnerabilities and makes a compelling cas
π· Nation State
π Read full article on NewsNukem
π The invisible front: Analyzing Russia's relentless cyberwar against Ukraine
A deep dive into Russia's persistent cyber campaign against Ukraine, detailing the wiper malware, critical infrastructure attacks, and defensive lesso
π· Nation State
π Read full article on NewsNukem
A deep dive into Russia's persistent cyber campaign against Ukraine, detailing the wiper malware, critical infrastructure attacks, and defensive lesso
π· Nation State
π Read full article on NewsNukem
π Ukraine's cyber front: Analyzing Russia's relentless digital assault
A deep dive into the relentless cyber warfare waged by Russia against Ukraine, detailing the malware, key attacks, and global impact of the digital fr
π· Nation State
π Read full article on NewsNukem
A deep dive into the relentless cyber warfare waged by Russia against Ukraine, detailing the malware, key attacks, and global impact of the digital fr
π· Nation State
π Read full article on NewsNukem
π A 2013 hack revealed Russia's drone program relied 90% on Chinese parts
A 2013 hack by Shaltai Boltai revealed Russia's MVD drone project was 90% reliant on Chinese electronics, exposing a critical supply chain vulnerabili
π· Data Breaches
π Read full article on NewsNukem
A 2013 hack by Shaltai Boltai revealed Russia's MVD drone project was 90% reliant on Chinese electronics, exposing a critical supply chain vulnerabili
π· Data Breaches
π Read full article on NewsNukem
β οΈ When code kills: Lawmakers weigh terrorism and homicide charges for hospital ransomware attacks
In the wake of devastating attacks on the healthcare sector, U.S. lawmakers are exploring unprecedented legal actions, including terrorism and homicid
π· Vulnerabilities
π Read full article on NewsNukem
In the wake of devastating attacks on the healthcare sector, U.S. lawmakers are exploring unprecedented legal actions, including terrorism and homicid
π· Vulnerabilities
π Read full article on NewsNukem
β οΈ UK regulator to probe Telegram, teen chat sites for potential child safety violations
Ofcom launches its first major investigation under the new Online Safety Act, targeting Telegram over allegations of CSAM distribution, setting a majo
π· Vulnerabilities
π Read full article on NewsNukem
Ofcom launches its first major investigation under the new Online Safety Act, targeting Telegram over allegations of CSAM distribution, setting a majo
π· Vulnerabilities
π Read full article on NewsNukem
β οΈ UK regulator launches investigation into Telegram over child safety failures
The UK's communications regulator, Ofcom, has launched a formal investigation into Telegram over its failure to prevent the sharing of CSAM.
π· Vulnerabilities
π Read full article on NewsNukem
The UK's communications regulator, Ofcom, has launched a formal investigation into Telegram over its failure to prevent the sharing of CSAM.
π· Vulnerabilities
π Read full article on NewsNukem
π Geofence warrants on trial: The Supreme Court weighs privacy against policing
The Supreme Court is considering Chatrie v. United States, a case that will decide if geofence warrantsβdigital dragnets of location dataβare constitu
π· Privacy
π Read full article on NewsNukem
The Supreme Court is considering Chatrie v. United States, a case that will decide if geofence warrantsβdigital dragnets of location dataβare constitu
π· Privacy
π Read full article on NewsNukem
π Chinaβs cyber capabilities now equal to the US, warns Dutch intelligence
Dutch intelligence agencies warn that China's cyber capabilities now match the US, using sophisticated techniques that often go undetected by defender
π· Nation State
π Read full article on NewsNukem
Dutch intelligence agencies warn that China's cyber capabilities now match the US, using sophisticated techniques that often go undetected by defender
π· Nation State
π Read full article on NewsNukem
β οΈ Lotus Wiper: A deep dive into the malware targeting Venezuela's energy sector
A new wiper malware, Lotus Wiper, was found targeting Venezuela's energy sector. Our analysis covers its destructive methods and geopolitical implicat
π· Vulnerabilities
π Read full article on NewsNukem
A new wiper malware, Lotus Wiper, was found targeting Venezuela's energy sector. Our analysis covers its destructive methods and geopolitical implicat
π· Vulnerabilities
π Read full article on NewsNukem