The Growing Cybersecurity Threat of Consumer Drones

Drones, once just recreational gadgets or tools for aerial photography, are increasingly becoming sophisticated instruments for cyberattacks. Recent real-world incidents are highlighting how drones can be weaponized to exploit both…

TIDRONE Targets Military and Satellite Industries in Taiwan: An In-Depth Analysis

In 2024, an unidentified cyber threat cluster known as TIDRONE emerged, demonstrating a particular interest in military-related industries, with a focus on drone manufacturers in Taiwan. Linked to Chinese-speaking groups,…

Unmasking Styx Stealer: A Developer’s OpSec Blunder Unveils Cybercriminal Network

Recently, Check Point Research (CPR) uncovered a treasure trove of intelligence while investigating Styx Stealer, a potent new malware that can harvest sensitive information from browsers, instant messaging platforms like…

Iran-Linked APT34 Targets Iraq: A New Cyber Espionage Campaign Unfolds

A new cybersecurity threat has emerged from the shadows, with Iranian-linked hackers setting their sights on Iraqi government organizations. This latest espionage campaign, unearthed by researchers at the Israeli cybersecurity…

China’s Hold on U.S. Port Security: A Ticking Cyber Time Bomb?

A new report authored by the US House Committee on Homeland Security and the Select Committee on Strategic Competition with China reveals just how vulnerable America’s critical port infrastructure has…

Quad7 Botnet Operators: Evolving Tactics and Expanding Threats

The operators behind the Quad7 botnet, a sophisticated cybercriminal group targeting SOHO routers and VPN appliances, have recently expanded their operations with new tactics and tools. These developments, uncovered by…

Iranian Fuel Stations Face Rising Cyberattack Threats

Iranian Vice President Mohammad Reza Aref has raised alarm over the increasing vulnerability of the country’s fuel station network to cyberattacks. His concerns come at a crucial time, as the…

PIXHELL Attack: Extracting Data from Air-Gapped Systems Using Screen Emissions

The PIXHELL attack, a new covert channel technique, demonstrates how attackers can exfiltrate sensitive data from air-gapped systems by leveraging the acoustic noise generated by pixels on LCD screens. Developed…

Flipper Zero’s Major Firmware Update: Expanded Features and Enhanced Performance

The Flipper Zero, a versatile hacking tool beloved by the tech and hobbyist community, has just released a significant firmware upgrade. Flipper’s 1.0 firmware update introduces a range of new…

AI-Fueled Scams and Ransomware Rise as Major Threats to Consumers in 2024: Insights from Gen’s Q2/2024 Threat Report

AI is now a game-changer for cybercriminals, who are leveraging it to craft increasingly sophisticated attacks. According to the latest Q2/2024 Gen Threat Report by Gen™, the global leader in…