NewsNukem 🧨
4 subscribers
249 photos
249 links
We don't just report the news. We detonate it.
What happened? Why it matters? What comes next? Here to talk about it.

🌐 newsnukem.com
πŸ“‘ Breaking cybersecurity news, daily.
Download Telegram
🌐 Ukraine confirms suspected APT28 campaign targeting prosecutors and anti-corruption agencies

Ukraine's CERT-UA confirms a Russian APT28 campaign used Roundcube webmail exploits to spy on prosecutors and anti-corruption officials.

🏷 Nation State

πŸ”— Read full article on NewsNukem
πŸ€– Vulnerability in Cursor AI allowed remote takeover of developer machines

A multi-stage flaw in the Cursor AI IDE could be triggered by opening a malicious file, leading to remote code execution and full system access.

🏷 Ai Security

πŸ”— Read full article on NewsNukem
🌐 Crypto exchange Grinex blames Western spies for $13m theft

Russian crypto-exchange Grinex claims Western intelligence was behind a $13m heist, but a lack of evidence has drawn skepticism from security experts.

🏷 Nation State

πŸ”— Read full article on NewsNukem
πŸ”’ FISA Section 702 renewed for two years after contentious congressional battle

A contentious legislative battle ends with a two-year renewal of the controversial FISA Section 702 surveillance program, side-stepping major privacy

🏷 Privacy

πŸ”— Read full article on NewsNukem
🌐 Anatomy of a deception: How a fake Ukraine war headline reveals a timeless cyber threat

A fake Reddit headline about the Ukraine war reveals a classic social engineering tactic. Learn how threat actors use deception and how to stay safe.

🏷 Nation State

πŸ”— Read full article on NewsNukem
πŸ€– A hypothetical design flaw in an AI protocol reveals real-world supply chain threats

A deep dive into a hypothetical AI vulnerability that reveals real-world threats to the AI supply chain, from remote code execution to systemic compro

🏷 Ai Security

πŸ”— Read full article on NewsNukem
🌐 Ukraine's robotic army: Analyzing the cyber attack surface of 25,000 frontline UGVs

Ukraine's plan to deploy 25,000 ground robots is a strategic masterstroke, but it creates a vast new cyber attack surface vulnerable to hacking and EW

🏷 Nation State

πŸ”— Read full article on NewsNukem
πŸ€– Elon Musk fails to appear for questioning by French police over sexualized AI images on X

An analysis of the French investigation into X over AI-generated child abuse images, and why the non-appearance of its top executives signals a seriou

🏷 Ai Security

πŸ”— Read full article on NewsNukem
⚠️ ZionSiphon malware targets water infrastructure systems with sabotage capabilities

A deep dive into ZionSiphon, a new malware targeting water systems with sabotage capabilities, and how utilities can defend against this critical thre

🏷 Vulnerabilities

πŸ”— Read full article on NewsNukem
πŸ”“ Anatomy of a heist: How North Korean hackers allegedly stole $290 million in crypto this year

A series of 2023 crypto heists totaling $290M has been linked to North Korea's Lazarus Group, exposing critical vulnerabilities in the DeFi space.

🏷 Data Breaches

πŸ”— Read full article on NewsNukem
🌐 The anatomy of a phantom menace: Why a hypothetical Axios attack is a real warning for supply chain security

A hypothetical attack on the Axios library serves as a stark warning about real-world software supply chain vulnerabilities and makes a compelling cas

🏷 Nation State

πŸ”— Read full article on NewsNukem
🌐 The invisible front: Analyzing Russia's relentless cyberwar against Ukraine

A deep dive into Russia's persistent cyber campaign against Ukraine, detailing the wiper malware, critical infrastructure attacks, and defensive lesso

🏷 Nation State

πŸ”— Read full article on NewsNukem
🌐 Ukraine's cyber front: Analyzing Russia's relentless digital assault

A deep dive into the relentless cyber warfare waged by Russia against Ukraine, detailing the malware, key attacks, and global impact of the digital fr

🏷 Nation State

πŸ”— Read full article on NewsNukem
πŸ”“ A 2013 hack revealed Russia's drone program relied 90% on Chinese parts

A 2013 hack by Shaltai Boltai revealed Russia's MVD drone project was 90% reliant on Chinese electronics, exposing a critical supply chain vulnerabili

🏷 Data Breaches

πŸ”— Read full article on NewsNukem
⚠️ When code kills: Lawmakers weigh terrorism and homicide charges for hospital ransomware attacks

In the wake of devastating attacks on the healthcare sector, U.S. lawmakers are exploring unprecedented legal actions, including terrorism and homicid

🏷 Vulnerabilities

πŸ”— Read full article on NewsNukem
⚠️ UK regulator to probe Telegram, teen chat sites for potential child safety violations

Ofcom launches its first major investigation under the new Online Safety Act, targeting Telegram over allegations of CSAM distribution, setting a majo

🏷 Vulnerabilities

πŸ”— Read full article on NewsNukem
⚠️ UK regulator launches investigation into Telegram over child safety failures

The UK's communications regulator, Ofcom, has launched a formal investigation into Telegram over its failure to prevent the sharing of CSAM.

🏷 Vulnerabilities

πŸ”— Read full article on NewsNukem
πŸ”’ Geofence warrants on trial: The Supreme Court weighs privacy against policing

The Supreme Court is considering Chatrie v. United States, a case that will decide if geofence warrantsβ€”digital dragnets of location dataβ€”are constitu

🏷 Privacy

πŸ”— Read full article on NewsNukem
🌐 China’s cyber capabilities now equal to the US, warns Dutch intelligence

Dutch intelligence agencies warn that China's cyber capabilities now match the US, using sophisticated techniques that often go undetected by defender

🏷 Nation State

πŸ”— Read full article on NewsNukem
⚠️ Lotus Wiper: A deep dive into the malware targeting Venezuela's energy sector

A new wiper malware, Lotus Wiper, was found targeting Venezuela's energy sector. Our analysis covers its destructive methods and geopolitical implicat

🏷 Vulnerabilities

πŸ”— Read full article on NewsNukem