April 17, 2026
Categories
US nationals sentenced for aiding North Korea’s tech worker scheme
Skip to main content Kejia Wang and Zhenxing Wang established…
Officials seize 53 DDoS-for-hire domains in ongoing crackdown
Skip to main content Operation PowerOFF’s latest globally coordinated action…
Ghost breaches: How AI-mediated narratives have become a new threat vector
Skip to main content Three incidents. No actual breaches. Full-scale…
Operation PowerOFF identifies 75k DDoS users, takes down 53 domains
More than 75,000 individuals using distributed denial-of-service (DDoS) platforms for…
ZionSiphon malware designed to sabotage water treatment systems
A new malware called ZionSiphon, specifically designed for operational technology,…
New Microsoft Defender “RedSun” zero-day PoC grants SYSTEM privileges
A researcher known as "Chaotic Eclipse" has published a proof-of-concept…
Hackers exploit Marimo flaw to deploy NKAbuse malware from Hugging Face
Hackers are exploiting a critical vulnerability in Marimo reactive Python notebook…
Google expands Gemini AI use to fight malicious ads on its platform
Google says it is increasingly using its Gemini AI models…
New ATHR vishing platform uses AI voice agents for automated attacks
A new cybercrime platform called ATHR can harvest credentials via…
Most “AI SOCs” Are Just Faster Triage. That’s Not Enough.
The "AI SOC" is having a moment. Vendors are promising…