Moonstone Sleet: A new North Korean threat actor
Microsoft has named yet another state-aligned threat actor: Moonstone Sleet (formerly Storm-1789), which engages in cyberespionage and ransomware attacks to further goals of the North Korean regime. “Moonstone Sleet uses tactics, techniques, an.....»»
Apple warns spyware targets via ‘threat notifications,’ offers these next steps
Did you know that Apple, for years, has had a system and process for sending ‘threat notifications’ to users of suspected spyware attacks? Here’s what that means, and new details on the guidance Apple gives users with a compromised device......»»
Intense ribbons of rain also bring the heat, scientists say
The environmental threat posed by atmospheric rivers—long, narrow ribbons of water vapor in the sky—doesn't come only in the form of concentrated, torrential downpours and severe flooding characteristic of these natural phenomena. According to a.....»»
Get this 25% Discount on the Samsung Galaxy A35!
Get the Galaxy A35 for much less! The post Get this 25% Discount on the Samsung Galaxy A35! appeared first on Phandroid. The Samsung Galaxy A35 is currently one of the more affordable smartphones in the North American market, and it packs.....»»
Federal protection for monarch butterflies could help or harm this iconic species, depending on how it"s carried out
Monarch butterflies are among the most beloved insects in North America. They are brightly colored and unique, both as caterpillars and later as mature insects. Monarchs are found in every U.S. state except Alaska, so nearly everyone has seen a monar.....»»
Cryptocurrency hackers stole $2.2 billion from platforms in 2024
$2.2 billion worth of cryptocurrency was stolen from various platforms in 2024, Chainalysis’ 2025 Crypto Crime Report has revealed. Of that sum, $1.34 billion was stolen by North Korea-affiliated hackers, across 47 hacking incidents (out of 303.....»»
Ransomware in 2024: New players, bigger payouts, and smarter tactics
In 2024, ransomware remained the top cybersecurity threat to organizations worldwide. New groups filled the void left by law enforcement crackdowns, targeting businesses with record-breaking ransom demands and sophisticated tactics. In this article,.....»»
Are threat feeds masking your biggest security blind spot?
Security teams that subscribe to threat feeds get lists of known malicious domains, IPs, and file signatures that they can leverage to blacklist and prevent attacks from those sources. The post Are threat feeds masking your biggest security blind spo.....»»
NetSPI introduces external attack surface management solutions
NetSPI introduced three tiers of external attack surface management (EASM) solutions, delivered through the The NetSPI Platform. The new offerings address the evolving needs of NetSPI’s global customer base, to move toward a continuous threat e.....»»
New radar algorithm reveals hidden dance of ionospheric plasma
At night, charged particles from the sun caught by Earth's magnetosphere rain down into the atmosphere. The impacting particles rip electrons from atoms in the atmosphere, creating both beauty and chaos. These high-energy interactions cause the north.....»»
Researchers explore, sample and interpret lunar volatiles in polar cold traps
The moon has both a South and North Pole, but just how cold are they? For context, Antarctica's coastal temperatures average around 14°F (-10°C), while the interior drops to -76°F (-60°C), making Earth's South Pole one of the coldest places on th.....»»
Why natural disasters hit harder in rural school districts
A week after Hurricane Sandy flooded New York City's streets and subways in 2012, the city's schools were back in business. But schools in rural North Carolina did not reopen until almost a month after Hurricane Helene roared through in late Septembe.....»»
Swedish oak forests study reveals unexpected patterns in biodiversity, poses challenge for conservation
A new study from Linnaeus University reports that plant and insect diversity in Swedish oak forests increases toward the north. This finding contrasts with established global biodiversity patterns and poses a challenge for the development of climate-.....»»
Most popular home internet routers in US may be banned as national security risk
The most popular home internet router brand in the US may be banned from sale in the country over fears that it represents a threat to national security. Three separate US agencies have opened investigations into TP-Link routers, which account for.....»»
European companies hit with effective DocuSign-themed phishing emails
A threat actor looking to take over the Microsoft Azure cloud infrastructure of European companies has successfully compromised accounts of multiple victims in different firms, according to Palo Alto Networks’ Unit 42 researchers. The phishing.....»»
Stairwell Core boosts threat intelligence for security teams
Stairwell announces Stairwell Core, which enables organizations to privately collect, store, and continuously reassess executable files so they can confidently determine if malware has affected their systems. Core offers customers an accessible entry.....»»
Samsung Reveals Big Plans for AI Integration
The South Korean tech giant states that it's been working on new AI-based software for improved user experiences across the board The post Samsung Reveals Big Plans for AI Integration appeared first on Phandroid. Following the launch of it.....»»
Gladiator II: A historian on the real north African kingdom of Numidia—and the men who ruled it
"Gladiator II" opens with a Roman fleet brutally laying siege to a city in the north African kingdom of Numidia. On the big screen we see ships set ablaze by pots of burning oil and defenders impaled by man-sized iron bolts. The so-called barbarian i.....»»
Malvertising on steroids serves Lumma infostealer
A large-scale malvertising campaign distributing the Lumma infostealer malware via intrusive “ads” leading to fake CAPTCHA pages has been tied by researchers to a threat actor abusing the Monetag ad network. The campaign from the users.....»»
The shifting security landscape: 2025 predictions and challenges
As the borderless threat ecosystem poses new challenges for companies and governments worldwide, CISA’s 2025-2026 International Plan aims to address this problem. CISA’s plan calls for integrated cyber defense across borders, addressing the c.....»»
Threat of abrupt mortality events keeps endangered monkey population at risk, despite decades of growth
Despite the population being almost four times larger than it was in 1982, a new study published in the journal Ecology suggests the northern muriqui monkeys remain at risk, especially in the face of ongoing habitat disturbances......»»