Category: Cyber News


  • Mysterious Elephant: a growing threat

    Introduction Mysterious Elephant is a highly active advanced persistent threat (APT) group that we at Kaspersky GReAT discovered in 2023. It has been consistently evolving and adapting its tactics, techniques, and procedures (TTPs) to stay under the radar. With a primary focus on targeting government entities and foreign affairs sectors in the Asia-Pacific region, the…

  • Moving Beyond Awareness: How Threat Hunting Builds Readiness

    Every October brings a familiar rhythm – pumpkin-spice everything in stores and cafés, alongside a wave of reminders, webinars, and checklists in my inbox. Halloween may be just around the corner, yet for those of us in cybersecurity, Security Awareness Month is the true seasonal milestone. Make no mistake, as a security professional, I love…

  • RMPocalypse: Single 8-Byte Write Shatters AMD’s SEV-SNP Confidential Computing

    Chipmaker AMD has released fixes to address a security flaw dubbed RMPocalypse that could be exploited to undermine confidential computing guarantees provided by Secure Encrypted Virtualization with Secure Nested Paging (SEV-SNP). The attack, per ETH Zürich researchers Benedict Schlüter and Shweta Shinde, exploits AMD’s incomplete protections that make it possible to perform a single memory…

  • New Pixnapping Android Flaw Lets Rogue Apps Steal 2FA Codes Without Permissions

    Android devices from Google and Samsung have been found vulnerable to a side-channel attack that could be exploited to covertly steal two-factor authentication (2FA) codes, Google Maps timelines, and other sensitive data without the users’ knowledge pixel-by-pixel. The attack has been codenamed Pixnapping by a group of academics from the University of California (Berkeley), University…

  • What AI Reveals About Web Applications— and Why It Matters

    Before an attacker ever sends a payload, they’ve already done the work of understanding how your environment is built. They look at your login flows, your JavaScript files, your error messages, your API documentation, your GitHub repos. These are all clues that help them understand how your systems behave. AI is significantly accelerating reconnaissance and…

  • Signal in the noise: what hashtags reveal about hacktivism in 2025

    What do hacktivist campaigns look like in 2025? To answer this question, we analyzed more than 11,000 posts produced by over 120 hacktivist groups circulating across both the surface web and the dark web, with a particular focus on groups targeting MENA countries. The primary goal of our research is to highlight patterns in hacktivist…

  • Financial, Other Industries Urged to Prepare for Quantum Computers

    Despite daunting technical challenges, a quantum computer capable of breaking public-key encryption systems may only be a decade or two off. ​ ​ ​Read More

  • Critical infrastructure CISOs Can’t Ignore ‘Back-Office Clutter’ Data

    OT and ICS systems indeed hold the crown jewels of critical infrastructure organizations, but unmonitored data sprawl is proving to be pure gold for increasingly brazen nation-state threat actors like Volt Typhoon, Pearce argues. ​ ​ ​Read More

  • Generation AI: Why Today’s Tech Graduates Are At a Disadvantage

    With artificial intelligence supplanting entry-level security jobs, new cyber professionals will have to up their game to stay competitive in the industry. ​ ​ ​Read More

  • ⚡ Weekly Recap: WhatsApp Worm, Critical CVEs, Oracle 0-Day, Ransomware Cartel & More

    Every week, the cyber world reminds us that silence doesn’t mean safety. Attacks often begin quietly — one unpatched flaw, one overlooked credential, one backup left unencrypted. By the time alarms sound, the damage is done. This week’s edition looks at how attackers are changing the game — linking different flaws, working together across borders,…