News
Amazon blocked 1,800 suspected North Korean scammers seeking jobs
Even Amazon isn't immune to North Korean scammers who try to score remote jobs at tech companies so they can funnel their wages to Kim Jong Un's coffers.…
Your car’s web browser may be on the road to cyber ruin
Web browsers for desktop and mobile devices tend to receive regular security updates, but that often isn't the case for those that reside within game consoles, televisions, e-readers, cars, and other devices. These outdated, embedded browsers can leave you open to phishing and other security vulnerabilities.…
Crypto crooks co-opt stolen AWS creds to mine coins
Your AWS account could be quietly running someone else's cryptominer. Cryptocurrency thieves are using stolen Amazon account credentials to mine for coins at the expense of AWS customers, abusing their Elastic Container Service (ECS) and their Elastic Compute Cloud (EC2) resources, in an ongoing operation that started on November 2.…
Kim's crypto thieving reached a record $2B in 2025
North Korea's yearly cryptocurrency thefts have accelerated, with Kim's state-backed cybercriminals plundering just over $2 billion worth of tokens in 2025.…
Another bad week for SonicWall as SMA 1000 zero-day under active exploit
SonicWall has warned customers of a zero-day flaw in its SMA 1000 remote-access appliance that's being actively exploited, potentially allowing attackers to escalate privileges and take over boxes.…
FBI dismantles alleged $70M crypto laundering operation
US feds have dismantled a crypto laundering service that they say helped cybercrooks wash tens of millions of dollars in dirty digital cash, seizing its servers and unsealing charges against an alleged Russian operator.…
NHS tech supplier probes cyberattack on internal systems
An NHS tech supplier is investigating a cyberattack that affected its systems in the early hours of Sunday.…
React2Shell exploitation spreads as Microsoft counts hundreds of hacked machines
Microsoft says attackers have already compromised "several hundred machines across a diverse set of organizations" via the React2Shell flaw, using the access to execute code, deploy malware, and, in some cases, deliver ransomware.…