ESET links Russia-backed Sandworm to a failed December 2025 cyberattack using DynoWiper malware against Poland’s power and ...
Sandworm (aka UAC-0113, APT44, and Seashell Blizzard) is thought to be part of the Russian military intelligence service ...
Researchers on Friday said that Poland’s electric grid was targeted by wiper malware, likely unleashed by Russia state ...
The alleged ransomware breach at Nike is reportedly attached to a countdown clock expiring 6 p.m. Saturday when stolen data ...
Researchers attributed the failed attempt to the infamous Russian APT Sandworm, which is notorious for wiper attacks on ...
China-linked Mustang Panda used updated COOLCLIENT malware in 2025 espionage to steal data from government and telecom ...
The infection then takes a particularly insidious turn. "After installation, the malware silently connects to WhatsApp Web, where it retrieves the victim’s contact list and automatically sends similar ...
The North Korean hacking group Kimsuky is using QR code phishing to target Americans with fake questionnaires and malicious ...
The New York Times has published new details about a purported cyber attack unnamed US officials claim plunged parts of Venezuela into darkness in the lead-up to the capture of the country’s president ...
Malware email attacks surge 131% year-over-year, accompanied by a rise in scams (+35%) and phishing (+21%) 77% of CISOs identified AI-generated phishing as a serious and emerging threat 68% of ...
Some of the most consequential cyber operations underway today do not look like attacks at all. They cause no immediate disruption, trigger no alarms and may remain invisible for years.
Cybersecurity is no longer a narrow technology concern. In today's hyper-connected global economy, it has become a defining issue of economic stability, operational continuity, and institutional trust ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results