Chinese Mustang Panda Used Fake Diplomatic Briefings to Spy on Officials

A new spy campaign by Mustang Panda uses fake US diplomatic briefings to target government officials. Discover how this silent surveillance operation works. Continue reading Chinese Mustang Panda Used Fake Diplomatic Briefings to Spy on Officials

Exposed AWS Credentials Lead to AI-Assisted Cloud Breach in 8 Minutes

Researchers recently tracked a high-speed cloud attack where an intruder gained
full admin access in just eight minutes. Discover how AI automation and a simple
storage error led to a major security breach. Continue reading Exposed AWS Credentials Lead to AI-Assisted Cloud Breach in 8 Minutes

Op Neusploit: Russian APT28 Uses Microsoft Office Flaw in Malware Attacks

A new campaign by the Russian-linked group APT28, called Op Neusploit, exploits a Microsoft Office flaw to steal emails for remote control of devices in Ukraine, Slovakia, and Romania. Continue reading Op Neusploit: Russian APT28 Uses Microsoft Office Flaw in Malware Attacks

Spotify and Major Music Labels Sue Anna’s Archive for $13 Trillion

Spotify and the Big Three labels have filed a record-breaking $13 trillion lawsuit against Anna’s Archive over a massive music data scrape. Find out what this means for the future of digital music. Continue reading Spotify and Major Music Labels Sue Anna’s Archive for $13 Trillion

Windows Malware Uses Pulsar RAT for Live Chats While Stealing Data

We usually think of computer viruses as silent, invisible programs running in the background, but a worrying discovery shows that modern hackers are getting much more personal. Continue reading Windows Malware Uses Pulsar RAT for Live Chats While Stealing Data