KelpDAO suffers $290 million heist tied to Lazarus hackers
!https://www.bleepstatic.com/content/hl-images/2023/12/01/Hackers_crypto.jpg State-sponsored North Korean hackers are likely behind the $290 million crypto‑heis...
509 posts from this source
!https://www.bleepstatic.com/content/hl-images/2023/12/01/Hackers_crypto.jpg State-sponsored North Korean hackers are likely behind the $290 million crypto‑heis...
!https://www.bleepstatic.com/content/hl-images/2025/09/11/Apple_headpic.jpg A set of 26 malicious apps on the Apple App Store impersonate popular wallets—such a...
!https://www.bleepstatic.com/content/hl-images/2023/10/25/seiko-header-image.jpg Incident Overview The Seiko USA website was defaced over the weekend. Visitors...
Microsoft is warning that threat actors are increasingly abusing external Microsoft Teams collaboration and relying on legitimate tools for access and lateral m...
File Explorer speed and performance improvements Microsoft is rolling out multiple File Explorer changes to Windows 11 users in the Insider program, including...
!https://www.bleepstatic.com/content/hl-images/2025/11/13/Microsoft_Teams.jpg Incident Overview Microsoft has reverted a recent service update that was preventi...
!https://www.bleepstatic.com/content/hl-images/2026/04/15/Windows_Server.jpg Microsoft has released out‑of‑band OOB updates to fix issues affecting Windows Serv...
!https://www.bleepstatic.com/content/hl-images/2026/04/19/vercel-header-lg.jpg Cloud development platform Vercel has disclosed a security incident after threat...
!https://www.bleepstatic.com/content/hl-images/2023/09/11/apple_triangle.jpg Apple account change notifications are being abused to send fake iPhone purchase ph...
!https://www.bleepstatic.com/content/hl-images/2026/04/17/NIST.jpg The National Institute of Standards and Technology will stop assigning severity scores to low...
!https://www.bleepstatic.com/content/hl-images/2026/04/17/protobuf.jpg Overview Proof‑of‑concept exploit code has been published for a critical remote code exec...
!https://www.bleepstatic.com/content/hl-images/2025/08/19/Microsoft-Teams.jpg Microsoft warned that a recent Microsoft Edge browser update introduced a bug that...
!https://www.bleepstatic.com/content/hl-images/2024/12/10/hacker-box.jpg The Payouts King ransomware is using the QEMU emulator as a reverse SSH backdoor to run...
!https://www.bleepstatic.com/content/hl-images/2026/04/17/Russia-crypto.jpg Kyrgyzstan-based cryptocurrency exchange Grinex has suspended its operations after s...
!https://www.bleepstatic.com/content/hl-images/2023/09/22/hacker-looking-at-computer-screens.jpg Cyberattacks are evolving faster than many MSP and corporate de...
!https://www.bleepstatic.com/content/hl-images/2026/04/17/Apache.jpg The U.S. Cybersecurity and Infrastructure Security Agency CISA warned on Thursday that a hi...
!https://www.bleepstatic.com/content/hl-images/2026/04/17/Windows_Server.jpg Microsoft has confirmed that some Windows domain controllers are entering restart l...
!https://www.bleepstatic.com/content/hl-images/2026/04/17/Hacker.jpg Sentencing 23‑year‑old Kamerin Stokes of Memphis, Tennessee, was sentenced to 30 months in...
!https://www.bleepstatic.com/content/hl-images/2026/02/13/Windows-headpic.jpg Threat actors are exploiting three recently disclosed Windows security vulnerabili...
!https://www.bleepstatic.com/content/hl-images/2022/04/11/Europol_headpic.jpg More than 75,000 individuals using distributed denial‑of‑service DDoS platforms fo...
!https://www.bleepstatic.com/content/hl-images/2024/09/24/water-plant-hacker.jpg A new malware called ZionSiphon, specifically designed for operational technolo...
!https://www.bleepstatic.com/content/hl-images/2023/10/11/Microsoft-Defender_for_Endpoint.jpg Overview A researcher known as Chaotic Eclipse released a proof‑of...
!https://www.bleepstatic.com/content/hl-images/2025/09/09/hacker.jpg Overview Hackers are exploiting a critical remote‑code‑execution vulnerability in the Marim...
!https://www.bleepstatic.com/content/hl-images/2024/08/13/Gemini.jpg Google says it is increasingly using its Gemini AI models to detect and block harmful ads o...
!https://www.bleepstatic.com/content/hl-images/2026/04/16/Robot.jpg A new cybercrime platform called ATHR can harvest credentials via fully automated voice‑phis...
!https://www.bleepstatic.com/content/hl-images/2025/03/04/Cisco-headpic.jpg Cisco has released security updates to patch four critical vulnerabilities, includin...
!https://www.bleepstatic.com/content/hl-images/2026/04/16/McGraw_Hill.jpg The ShinyHunters extortion group has leaked data from 13.5 million McGraw Hill user ac...
!https://www.bleepstatic.com/content/hl-images/2026/04/16/North_Korea.jpg Scheme overview Two U.S. nationals, 42‑year‑old Kejia Wang and 39‑year‑old Zhenxing Wa...
!https://www.bleepstatic.com/content/hl-images/2026/04/10/Marimo.jpg Hackers started exploiting a critical vulnerability in the Marimo open‑source reactive Pyth...
!https://www.bleepstatic.com/content/hl-images/2026/04/10/Hacker_bitcoin.jpg Operation Atlantic An international law‑enforcement action led by the U.K.’s Nation...
!https://www.bleepstatic.com/content/hl-images/2023/03/24/ChatGPT-logo.jpg OpenAI has rolled out a new Pro subscription that costs $100, matching Anthropic’s Cl...
!https://www.bleepstatic.com/content/hl-images/2026/01/28/Hacker-typing.jpg Overview The attack surface targeted by Iranian‑linked hackers in cyberattacks again...
!https://www.bleepstatic.com/content/hl-images/2023/11/09/CPU-Z.jpg Hackers gained access to an API for the CPUID project and changed the download links on the...
!https://www.bleepstatic.com/content/hl-images/2026/04/10/Canada_pirate_hackers.jpg Threat actor and attack method A financially motivated threat actor tracked...
Google says Gmail end‑to‑end encryption E2EE is now available on all Android and iOS devices, allowing enterprise users to read and compose encrypted emails wit...
!https://www.bleepstatic.com/content/hl-images/2026/04/09/0_rook.jpg A new Lua‑based malware, called LucidRook, is being used in spear‑phishing campaigns target...
!https://www.bleepstatic.com/content/hl-images/2025/09/03/AI-Hacker.jpg Threat actors using a previously undocumented phishing‑as‑a‑service PhaaS platform calle...
!https://www.bleepstatic.com/content/hl-images/2026/04/09/hospital.jpg Incident Overview Dutch healthcare software vendor ChipSoft was hit by a ransomware attac...
!https://www.bleepstatic.com/content/hl-images/2023/06/16/Google-Chrome-headpic.jpg Google has rolled out Device Bound Session Credentials DBSC protection in Ch...
!https://www.bleepstatic.com/content/hl-images/2023/12/07/back-2.jpg Hackers hijacked the update system for the Smart Slider 3 Pro plugin for WordPress and Joom...
!https://www.bleepstatic.com/content/hl-images/2023/09/29/person-working-on-computers-cybersecurity.jpg Cyberattacks rarely come out of nowhere—threat actors of...
!https://www.bleepstatic.com/content/hl-images/2026/04/09/High-speed_train_Europe.jpg Overview Eurail B.V., a European travel operator that provides digital pas...
!https://www.bleepstatic.com/content/hl-images/2026/04/09/Adobe.jpg Attackers have been exploiting a zero‑day vulnerability in Adobe Reader using maliciously cr...
!https://www.bleepstatic.com/content/hl-images/2026/04/09/Bitcoin_Depot.jpg Incident Overview Bitcoin Depot, which operates one of the largest Bitcoin ATM netwo...
!https://www.bleepstatic.com/content/hl-images/2025/08/07/Microsoft.jpg Microsoft has suspended developer accounts used to maintain multiple high‑profile open‑s...
!https://www.bleepstatic.com/content/hl-images/2025/11/05/Credit-card-hacker.jpg A massive campaign affecting nearly 100 online stores that run the Magento e‑co...
!https://www.bleepstatic.com/content/hl-images/2026/04/08/raccoon.jpg Threat Actor Overview A threat actor tracked as UNC6783 is compromising business process o...
!https://www.bleepstatic.com/content/hl-images/2021/10/22/Apple_Finder_Mac__headpic.jpg A new campaign delivering the Atomic Stealer malware to macOS users abus...