• Internal
  • External
  • Cyber
  • Defense
  • Science and Tech
  • Space
  • Technology

Recent Posts

New Atomic macOS Stealer Campaign Exploits ClickFix to Target Apple Users

IndianCyberDefender
June 6, 2025

Fusion power may never happen if we don’t fix the lithium bottleneck

IndianCyberDefender
June 5, 2025

Sols 4559-4560: Drill Campaign — Searching for a Boxwork Bedrock Drill Site

IndianCyberDefender
June 5, 2025

WazirX Restructuring Plan Rejected By Singapore High Court; Crypto Firm to Appeal Decision

IndianCyberDefender
June 4, 2025
  • Home
  • Category
  • Cyber

Category : Cyber

U.S. Treasury Lifts Tornado Cash Sanctions Amid North Korea Money Laundering Probe

U.S. Treasury Lifts Tornado Cash Sanctions Amid North Korea Money Laundering Probe

Mar 22, 2025Ravie LakshmananFinancial Security / Cryptocurrency The U.S. Treasury Department has announced that it’s removing sanctions against Tornado Cash,

By IndianCyberDefender
March 24, 2025
Arrests in Tap-to-Pay Scheme Powered by Phishing – Krebs on Security

Arrests in Tap-to-Pay Scheme Powered by Phishing – Krebs on Security

Authorities in at least two U.S. states last week independently announced arrests of Chinese nationals accused of perpetrating a novel

By IndianCyberDefender
March 24, 2025
Coinbase Initially Targeted in GitHub Actions Supply Chain Attack; 218 Repositories’ CI/CD Secrets Exposed

Coinbase Initially Targeted in GitHub Actions Supply Chain Attack; 218 Repositories’ CI/CD Secrets Exposed

The supply chain attack involving the GitHub Action “tj-actions/changed-files” started as a highly-targeted attack against one of Coinbase’s open-source projects,

By IndianCyberDefender
March 24, 2025
How to Infect Your PC in Three Easy Steps – Krebs on Security

How to Infect Your PC in Three Easy Steps – Krebs on Security

A clever malware deployment scheme first spotted in targeted attacks last year has now gone mainstream. In this scam, dubbed

By IndianCyberDefender
March 19, 2025
Chinese Hackers Breach Juniper Networks Routers With Custom Backdoors and Rootkits

Chinese Hackers Breach Juniper Networks Routers With Custom Backdoors and Rootkits

The China-nexus cyber espionage group tracked as UNC3886 has been observed targeting end-of-life MX routers from Juniper Networks as part

By IndianCyberDefender
March 13, 2025
Notorious Malware, Spam Host “Prospero” Moves to Kaspersky Lab – Krebs on Security

Notorious Malware, Spam Host “Prospero” Moves to Kaspersky Lab – Krebs on Security

One of the most notorious providers of abuse-friendly “bulletproof” web hosting for cybercriminals has started routing its operations through networks

By IndianCyberDefender
March 6, 2025
Silver Fox APT Uses Winos 4.0 Malware in Cyber Attacks Against Taiwanese Organizations

Silver Fox APT Uses Winos 4.0 Malware in Cyber Attacks Against Taiwanese Organizations

Feb 27, 2025Ravie LakshmananMalware / Threat Intelligence A new campaign is targeting companies in Taiwan with malware known as Winos

By IndianCyberDefender
February 27, 2025
Nearly a Year Later, Mozilla is Still Promoting OneRep – Krebs on Security

Nearly a Year Later, Mozilla is Still Promoting OneRep – Krebs on Security

In mid-March 2024, KrebsOnSecurity revealed that the founder of the personal data removal service Onerep also founded dozens of people-search

By IndianCyberDefender
February 24, 2025
Google Cloud KMS Adds Quantum-Safe Digital Signatures to Defend Against Future Threats

Google Cloud KMS Adds Quantum-Safe Digital Signatures to Defend Against Future Threats

Feb 24, 2025Ravie LakshmananCloud Security / Encryption Google Cloud has announced quantum-safe digital signatures in Google Cloud Key Management Service

By IndianCyberDefender
February 24, 2025
How Phished Data Turns into Apple & Google Wallets – Krebs on Security

How Phished Data Turns into Apple & Google Wallets – Krebs on Security

Carding — the underground business of stealing, selling and swiping stolen payment card data — has long been the dominion

By IndianCyberDefender
February 24, 2025

  • 1
  • 2
  • 3
  • 4
  • …
  • 39

Recent Posts

  • New Atomic macOS Stealer Campaign Exploits ClickFix to Target Apple Users
  • Fusion power may never happen if we don’t fix the lithium bottleneck
  • Sols 4559-4560: Drill Campaign — Searching for a Boxwork Bedrock Drill Site
  • WazirX Restructuring Plan Rejected By Singapore High Court; Crypto Firm to Appeal Decision
  • Access Denied

Recent Comments

No comments to show.

Archives

  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023

Categories

  • Cyber
  • Defense
  • External
  • Internal
  • Miscellaneous
  • Politics
  • Science and Tech
  • Space
  • Technology

Popular Posts

New Atomic macOS Stealer Campaign Exploits ClickFix to Target Apple Users

IndianCyberDefender
June 6, 2025

Fusion power may never happen if we don’t fix the lithium bottleneck

IndianCyberDefender
June 5, 2025

Sols 4559-4560: Drill Campaign — Searching for a Boxwork Bedrock Drill Site

IndianCyberDefender
June 5, 2025

WazirX Restructuring Plan Rejected By Singapore High Court; Crypto Firm to Appeal Decision

IndianCyberDefender
June 4, 2025

Indian Cyber Defender