Cybersecurity

Evasive Panda APT campaign overview

Introduction The Evasive Panda APT group (also known as Bronze Highland, Daggerfly, and StormBamboo) has been active since 2012, targeting multiple industries with sophisticated, evolving...

How many states are there in the United States?

I've seen many API requests for different LLMs in the honeypot logs. Like this one: The prompt is always the same: "How many states are there in...

Patch Tuesday, January 2026 Edition – Krebs on Security

Microsoft today issued patches to plug at least 113 security holes in its various Windows operating systems and supported software. Eight of the vulnerabilities...

From Instagram panic to Grok gone wild • Graham Cluley

Confusion reigns after claims that data linked to 17.5 million Instagram accounts is up for sale...

Oak Cliff Swipers – Darknet Diaries

Full Transcript He started small, swiping cards, buying gift cards, and cashing out. It spiraled into a full‑blown criminal enterprise. Dozens...

Your information is on the dark web. What happens next?

If your data is on the dark web, it’s probably only a...

Who Decides Who Doesn’t Deserve Privacy?

Remember the Ashley Madison data breach? That was now more than a...

n8n Supply Chain Attack Abuses Community Nodes to Steal OAuth Tokens

Jan 12, 2026Ravie LakshmananVulnerability / Workflow Automation Threat actors have been observed uploading a set of eight packages on the npm registry that masqueraded as...

Industrial threat report for Q3 2025

Statistics across all threats In Q3 2025, the percentage of ICS computers on which malicious objects were blocked decreased from the previous quarter by 0.4...

Malicious Process Environment Block Manipulation

Reverse engineers must have a good understanding of the environment where malware are executed (read: the operating system). In a previous diary, I talked...

Who Benefited from the Aisuru and Kimwolf Botnets? – Krebs on Security

Our first story of 2026 revealed how a destructive new botnet called Kimwolf has infected more than two million devices by mass-compromising a vast...

How to scam someone in seven days • Graham Cluley

Romance scammers have apparently discovered astrology… and Taurus is their secret weapon. In episode 449 of “Smashing...

Recent articles