China-Linked Hackers Infiltrate Southeast Asian Military Networks for Years Undetected

A recent cybersecurity investigation has revealed a serious and long-running cyber espionage campaign targeting military organizations in Southeast Asia. Researchers from Palo Alto Networks’ Unit 42 found that hackers linked to China secretly accessed sensitive systems. They managed to stay hidden inside these networks for several years without being detected. This shows how advanced and … Continued

Phishing Attack Leads to Data Breach at Starbucks, 889 Employee Accounts Compromised

Starbucks has recently confirmed a data breach that affected hundreds of its employees. The incident involved unauthorized access to internal employee accounts within the company’s systems. According to the company, the breach was linked to the Partner Central platform, which employees use to manage HR services and work-related information. The company began investigating the issue … Continued

Researchers Uncover Six Android Malware Threats Targeting Pix Payments, Banking Apps, and Crypto Wallets

Cybersecurity researchers have recently discovered a new wave of Android malware that is designed to steal money and sensitive financial information from smartphone users. These malicious programs mainly target banking applications, cryptocurrency wallets, and digital payment platforms. The attackers use different techniques to secretly monitor activity on infected devices. Their main goal is to intercept … Continued

BeatBanker Android Malware Disguised as Starlink App Hijacks Devices and Targets Crypto Transactions

Cybersecurity researchers have identified a new Android malware called BeatBanker that spreads by pretending to be a Starlink application. The fake app tricks users into thinking they are installing a legitimate internet service tool. Once the app is installed, the malware silently takes control of the device. Experts warn that the campaign shows how attackers … Continued

UNC6426 Exploits Nx npm Supply-Chain Attack to Gain AWS Administrator Access in Just 72 Hours

A recent cybersecurity investigation revealed how a threat actor called UNC6426 managed to compromise a company’s cloud environment in less than 72 hours. The attackers used credentials stolen during the earlier Nx npm supply-chain incident. With those credentials, they were able to enter the organization’s development environment. Researchers say the case shows how fast attackers … Continued

Russian-Linked APT28 Uses BEARDSHELL Backdoor and COVENANT Framework in Ukraine Cyber Espionage Campaign

Cybersecurity researchers have discovered a new cyber-espionage campaign targeting Ukrainian military personnel. The operation has been linked to the Russian state-backed hacking group APT28. According to researchers, the attackers are using two malware tools called BEARDSHELL and COVENANT. The campaign is mainly focused on secretly collecting intelligence from compromised systems. Security experts say the activity … Continued

India’s Cybersecurity Spending Expected to Reach $3.4 Billion by 2026 as AI-Powered Cyber Threats Continue to Grow

India’s cybersecurity spending is expected to grow significantly as organizations face more advanced digital threats. According to a recent industry forecast, end-user spending on information security in India is projected to reach $3.4 billion by 2026. This represents an 11.7% increase compared with 2025. The growth reflects how seriously companies are now taking cybersecurity risks. … Continued

Malicious Chrome Extension Discovered After Developer Ownership Transfer

Cybersecurity researchers have recently discovered a serious security issue involving a Google Chrome extension that became malicious after its ownership was transferred to a new developer. The extension was originally considered safe and was used by many users for its normal functionality. However, after the ownership change, the extension began performing harmful activities inside users’ … Continued

Web Server Exploits and Mimikatz Used in Cyberattacks Targeting Asian Critical Infrastructure

Cybersecurity researchers recently discovered a new cyberattack campaign targeting critical infrastructure organizations across Asia. The activity was analyzed by security experts from Palo Alto Networks Unit 42 after observing suspicious activity on several networks. The attackers are mainly targeting important sectors such as aviation, energy, telecommunications, government agencies, technology companies, law enforcement, and pharmaceutical organizations. … Continued

Newsletter line