Iran-linked hackers have claimed responsibility for breaching FBI Director Kash Patel’s personal Gmail inbox, leaking photographs, documents, and email correspondence online. The hacker group Handala …
cyberintel.kalymoon.com · 5074 articles · updated every 4 hours · grows forever
Iran-linked hackers have claimed responsibility for breaching FBI Director Kash Patel’s personal Gmail inbox, leaking photographs, documents, and email correspondence online. The hacker group Handala …
Push Security has uncovered a new AiTM phishing campaign targeting TikTok for Business accounts using Google and TikTok themed login pages
Lloyds Banking Group has identified the glitch that led to some of its customers being able to see details of other customers’ transactions on March 12. It revealed the information in a letter to the …
The group that it was making available for download emails and other documents from Patel’s account. The post Pro-Iranian Hacking Group Claims Credit for Hack of FBI Director Kash Patel’s Personal Acc…
Nation-state malware is being sold on the Dark Web and leaked to GitHub; and ordinary organizations might not stand much of a chance of defending themselves.
The list of countries exploiting Internet-connected cameras to give them eyes inside their adversaries' borders continues to expand. What should companies look out for?
Chinese APT Red Menshen's super-advanced BPFdoor malware defeats traditional cybersecurity protections. All telcos can do, really, is try hunting it down.
TeamPCP, the threat actor behind the supply chain attack targeting Trivy, KICS, and litellm, has now compromised the telnyx Python package by pushing two malicious versions to steal sensitive data. Th…
Apple is now sending Lock Screen notifications to iPhones and iPads running older versions of iOS and iPadOS to alert users of web-based attacks and urge them to install the update. The development wa…
The European Commission, the European Union's main executive body, is investigating a security breach after a threat actor gained access to the Commission's Amazon cloud environment. [...]
A large-scale campaign is targeting developers on GitHub with fake Visual Studio Code (VS Code) security alerts posted in the Discussions section of various projects, to trick users into downloading m…
UAE Cyber Security Industry Report 2025: Market Strengthened by Collaboration Between Local Leaders Like DarkMatter, Help AG, and CPX and Global Vendors Including IBM, Cisco, and Palo Alto Networks Ya…
Huawei spotlights AI-driven networking and cybersecurity at IP Club 2026 MyBroadband
Exclusive: Anthropic is testing ‘Mythos,’ its ‘most powerful AI model ever developed’ Fortune
GPT Can’t Trace an Attack Chain. A Purpose-Built Cybersecurity LLM Can. securityboulevard.com
Pasadena Cybersecurity Firm Showcases Platform at Industry’s Largest Conference Pasadena Now
ENISA's de Vries on DDoS, Security Training and Road to Single Reporting Platform Europe's cybersecurity posture is hardening, but the threat landscape is evolving faster, says Hans de Vries, chief cy…
Booking Holdings' Bryan on Guardrails, Recovery and Making Security Everyone's Job Cyber defenders can't outpace AI-powered attackers using human effort alone. Deploying AI at machine speed - while ke…
Proofpoint CEO Sumit Dhawan on Applying Human Insider Risk Safeguards to AI Agents AI agents behave like humans and carry the same risk profile. They operate non-deterministically, can be manipulated …
WEF's Akshay Joshi on AI Risks, Geopolitics and the Growing Cyber Divide Cybersecurity leaders can no longer address AI, geopolitics, supply chains and workforce gaps in isolation, as convergence acro…
A South Asian financial institution has become the latest target of a focused cyberattack involving two custom-built malware tools — BRUSHWORM, a modular backdoor, and BRUSHLOGGER, a keylogger disguis…
Japan’s tax season has become a hunting ground for a well-organized threat actor known as Silver Fox. As Japanese companies enter their annual cycle of tax filing, salary reviews, and personnel change…
‘Q-Day’ and the cybersecurity problems it brings could come as early as 2029 as Google accelerates its post-quantum cryptography migration
Socket and Endor Labs discovered a new TeamPCP campaign leading to the delivery of credential-stealing malware