HeartCrypt’s wholesale impersonation effort
How the notorious Packer-as-a-Service operation built itself into a hydra
As SaaS providers race to integrate AI into their product offerings to stay competitive and relevant, a new challenge has emerged in the world of AI: shadow AI. Shadow AI refers to the unauthorized use of AI tools and copilots at organizations. For example, a developer using ChatGPT to assist with writing code, a salesperson…
Lee Gyu-lee reports: Korean white hat hacker team Maple Mallard Magistrates (MMM) won the Capture the Flag (CTF) hacking competition at this year’s DEF CON conference, held in Las Vegas from Thursday through Sunday (local time). The final round of CTF, the largest open computer security hacking competition, was held during the security conference, with……
Daryna Antoniuk reports: A Dutch appeals court sentenced a 44-year-old man to seven years in prison for hacking a major port company in Belgium to help smuggle cocaine into the Netherlands. The Amsterdam Court of Appeal ruled Friday that the man played a central technical role in a criminal network that exploited port computer systems in 2020……
The North Korean threat actors behind the Contagious Interview campaign have once again tweaked their tactics by using JSON storage services to stage malicious payloads. “The threat actors have recently resorted to utilizing JSON storage services like JSON Keeper, JSONsilo, and npoint.io to host and deliver malware from trojanized code projects, with the lure,” NVISO…
At the beginning of 2025, it appeared that Hunters International was abandoning encrypting victims and was re-branding as World Leaks. But Hunters kept updating their leak site with new encryption incidents instead of going extortion-only and becoming World Leaks. A World Leaks spokesperson subsequently informed DataBreaches that they had parted company with Hunters International over…
Onsa Mustafa reports: Pakistan’s National Cyber Emergency Response Team (NCERT) has issued a high-priority cybersecurity advisory, warning of a critical ransomware, “Blue Locker”, threat aimed at government ministries, regulatory bodies, and other essential organisations across the country. The malware has been observed in a growing number of incidents. It encrypts files on infected systems, appending……