Hunters International ransomware group claims to be shutting down
âAfter careful consideration and in light of recent developments, we have decided to close the Hunters International project,â the prolific cybercrime gang wrote on its darknet site.
North Korean Hackers Target Crypto Firms with Novel macOS Malware
SentinelLabs observed North Korean actors deploying novel TTPs to target crypto firms, including a mix of programming languages and signal-based persistence
What MITRE ATT&CK v17 Means for ESXi Security | CSA
MITRE ATT&CK v17 introduces an ESXi matrix, highlighting hypervisors as critical points of attack. Learn about the new TTPs and how to secure ESXi environments.
Hunters International ransomware shuts down after World Leaks rebrand
âThe Hunters International Ransomware-as-a-Service (RaaS) operation announced today that it has officially closed down its operations and will offer free decryptors to help victims recover their data without paying a ransom.
Surveillance Used by a Drug Cartel - Schneier on Security
Once you build a surveillance system, you canât control who will use it: A hacker working for the Sinaloa drug cartel was able to obtain an FBI officialâs phone records and use Mexico Cityâs surveillance cameras to help track and kill the agencyâs informants in 2018, according to a new US justice department report. The incident was disclosed in a justice department inspector generalâs audit of the FBIâs efforts to mitigate the effects of âubiquitous technical surveillance,â a term used to describe the global proliferation of cameras and the thriving trade in vast stores of communications, travel, and location data...
Microsoft asks users to ignore Windows Firewall config errors
Microsoft asked customers this week to disregard incorrect Windows Firewall errors that appear after rebooting their systems following the installation of the June 2025 preview update.
STRATEGIC REEL: APIs are the new perimeter â and business logic attacks are slipping through
APIs have become the digital glue of the enterprise â and attackers know it. Related: API security - the big picture In this debut edition of the Last Watchdog Strategic Reel (LWSR), A10 Networksâ Field CISO Jamison Utter cuts through the noise from RSAC 2025 with a sharp breakdown of todayâs API threatscape. From 15,000
News alert: SquareX research finds browser AI agents are proving riskier than human employees
Palo Alto, Calif., Jun. 30, 2025, CyberNewswire--Every security practitioner knows that employees are the weakest link in an organization, but this is no longer the case. SquareXâs research reveals that Browser AI Agents are more likely to fall prey to cyberattacks than employees, making them the new weakest link that enterprise security teams need to
NimDoor crypto-theft macOS malware revives itself when killed
North Korean state-backed hackers have been using a new family of macOS malware called NimDoor in a campaign that targets web3 and cryptocurrency organizations.
China-linked hackers spoof big-name brand websites to steal shoppers' payment info
The campaign uses thousands of phishing websites that mimic the design and product listings of retailers like Apple, Nordstrom and Hermes to trick people into entering their credit card information.
DOJ investigates ex-ransomware negotiator over extortion kickbacks
An ex-ransomware negotiator is under criminal investigation by the Department of Justice for allegedly working with ransomware gangs to profit from extortion payment deals.
Top FBI cyber official: Salt Typhoon âlargely containedâ in telecom networks | CyberScoop
Brett Leatherman told CyberScoop in an interview that while the group still poses a threat, the bureau is focused on resilience and victim support, and going on offense could be in the future.
Spain arrests hackers who targeted politicians and journalists
The Spanish police have arrested two individuals in the province of Las Palmas for their alleged involvement in cybercriminal activity, including data theft from the country's government.