Tag: EN

What Defenders Need to Know about Iran’s Cyber Capabilities

With the current Iran crisis at its peak, cyber activity is a relevant part of the threat picture alongside kinetic and political pressure. Iran’s ecosystem includes multiple clusters aligned with state entities, the Islamic Revolutionary Guard Corps (IRGC) and the Ministry of Intelligence and…

ShinyHunters leaked the full Odido dataset

Cybercrime group ShinyHunters leaked the full Odido dataset, the Netherlands is facing the biggest data leak in its history. Odido is a Dutch telecommunications company and one of the largest mobile network operators in the Netherlands. It was formed when T-Mobile…

Let’s explore the best alternatives to Discord

With many users feeling uneasy about Discord’s new age verification requirement, here are some alternatives that could be worth exploring. This article has been indexed from Security News | TechCrunch Read the original article: Let’s explore the best alternatives to…

Botnet Moves to Blockchain, Evades Traditional Takedowns

  A newly identified botnet loader is challenging long standing methods used to dismantle cybercrime infrastructure. Security researchers have uncovered a tool known as Aeternum C2 that stores its command instructions on the Polygon blockchain rather than on traditional servers…

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 86

Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape Malware Newsletter Technical Deep Dive: The Monero Mining Campaign Operation Olalampo: Inside MuddyWater’s Latest Campaign   VShell and SparkRAT Observed in Exploitation…

Face ID Security Risks and Privacy Concerns in 2026

  Facial recognition has been a topic of fascination for much of the last century, with films projected onto cinema screens, dystopian novels and think-tank papers debating whether the technology will ever become reality.  The technology was either portrayed as…