A North Korean threat group known as Slow Pisces has launched a sophisticated cyberattack campaign, focusing on developers in the cryptocurrency industry through LinkedIn. Also referred to as TraderTraitor or Jade Sleet, the group impersonates recruiters offering legitimate job…
Category: CySecurity News – Latest Information Security and Hacking Incidents
Chinese Ghost Hackers Focus on Profits, Attack Key Sectors in the US and UK
In the world of cybercrime, criminals usually fall into two groups. Some target individuals, tricking them for money. Others go after important organizations like hospitals and companies, hoping for bigger payouts. Although attacks on healthcare are less common, they…
SK Telecom Malware Attack Exposes USIM Data in South Korea
SK Telecom, South Korea’s top mobile carrier, has disclosed a security incident involving a malware infection that exposed sensitive information tied to users’ Universal Subscriber Identity Modules (USIMs). The breach was detected on the night of April 19, 2025,…
Zoom Platform Misused by Elusive Comet Attackers in Fraud Scheme
Recent reports suggest that North Korean threat actors are now employing an alarming evolution in the tactics they employ to launch a sophisticated cybercrime operation known as Elusive Comet, a sophisticated cybercrime operation. This newly uncovered campaign demonstrates a…
Cybersecurity Alert Says Fake PDF Converters Stealing Sensitive Information
Online PDF converters provide efficient conversions of documents from one file format to another, and millions of individuals and businesses use these services to do so. However, this free service also poses significant cybersecurity risks despite its convenience. According…
How to Protect Your Smartphone During US Border Crossings
Crossing into the United States has become riskier since the start of Trump’s second administration. Foreign visitors and US visa holders are increasingly being detained, questioned, or deported. As uncertainty grows, travel demand from Canada and Europe has dropped…
‘Fog’ Attackers Mock Victims With DOGE Ransom Notes
Fog ransomware assaults over the last month have included a new ransom note mentioning the US Department of Government Efficiency (DOGE) and enticing victims to propagate the malware to other PCs, Trend Micro said earlier this week. Analysis of…
Cybercriminals Are Now Focusing More on Stealing Credentials Than Using Ransomware, IBM Warns
A new report from IBM’s X-Force 2025 Threat Intelligence Index shows that cybercriminals are changing their tactics. Instead of mainly using ransomware to lock systems, more hackers are now trying to quietly steal login information. IBM studied over 150…
Tesla Users Targeted by Dangerous New Malware: What You Should Know
Tesla has often made headlines lately, but this new problem is not connected to Elon Musk or his cars. Instead, it involves cybercriminals who are trying to steal people’s private information using a dangerous software called Agent Tesla. Here’s…
Pentagon Director Hegseth Revealed Key Yemen War Plans in Second Signal Chat, Source Claims
In a chat group that included his wife, brother, and personal attorney, U.S. Defence Secretary Pete Hegseth provided specifics of a strike on Yemen’s Iran-aligned Houthis in March, a person familiar with the situation told Reuters earlier this week. …