A previously undocumented spyware called ‘Batavia’ has been targeting large industrial enterprises in Russia in a phishing email campaign that uses contract-related lures. […]
Hackers abuse leaked Shellter red team tool to deploy infostealers
Shellter Project, the vendor of a commercial AV/EDR evasion loader for penetration testing, confirmed that hackers used its Shellter Elite product in attacks after a customer leaked a copy of the software. […]
Hunters International Shuts Down, Offers Free Decryptors as It Morphs Into World Leaks
The notorious Hive successor ceases ransomware operations but pivots to pure data extortion under the new World Leaks brand.
The post Hunters International Shuts Down, Offers Free Decryptors as It Morphs Into World Leaks appeared first on SecurityWeek.
Ingram Micro Scrambling to Restore Systems After Ransomware Attack
The IT products and services giant did not say how the intrusion occurred or whether any data was stolen from its systems.
The post Ingram Micro Scrambling to Restore Systems After Ransomware Attack appeared first on SecurityWeek.
⚡ Weekly Recap: Chrome 0-Day, Ivanti Exploits, MacOS Stealers, Crypto Heists and More
Everything feels secure—until one small thing slips through. Even strong systems can break if a simple check is missed or a trusted tool is misused. Most threats don’t start with alarms—they sneak in through the little things we overlook. A tiny bug, a reused password, a quiet connection—that’s all it takes.
Staying safe isn’t just about reacting fast. It’s about catching these early signs
Staying safe isn’t just about reacting fast. It’s about catching these early signs
Manufacturing Security: Why Default Passwords Must Go
If you didn’t hear about Iranian hackers breaching US water facilities, it’s because they only managed to control a single pressure station serving 7,000 people. What made this attack noteworthy wasn’t its scale, but how easily the hackers gained access — by simply using the manufacturer’s default password “1111.” This narrow escape prompted CISA to urge manufacturers to
TAG-140 Deploys DRAT V2 RAT, Targeting Indian Government, Defense, and Rail Sectors
A hacking group with ties other than Pakistan has been found targeting Indian government organizations with a modified variant of a remote access trojan (RAT) called DRAT.
The activity has been attributed by Recorded Future’s Insikt Group to a threat actor tracked as TAG-140, which it said overlaps with SideCopy, an adversarial collective assessed to be an operational sub-cluster within
The activity has been attributed by Recorded Future’s Insikt Group to a threat actor tracked as TAG-140, which it said overlaps with SideCopy, an adversarial collective assessed to be an operational sub-cluster within
OpenAI says GPT-5 will unify breakthroughs from different models
OpenAI has again confirmed that it will unify multiple models into one and create GPT-5, which is expected to ship sometime in the summer. […]
Hands on with Windows 11 Notepad’s new markdown support
Notepad now lets you use markdown text formatting on Windows 11, which means you can write in Notepad just like you could in WordPad. […]
ChatGPT is testing disruptive Study Together feature
OpenAI’s “Study together” mode has been spotted in the wild, and it could help students prepare for exams directly from ChatGPT. […]
