Tag: group
-
Alleged scam kingpin Chen Zhi arrives in China after extradition from Colombia
Chen founded multinational conglomerate Prince Group that US says is front for multibillion-dollar fraud operationChinese television has shown footage of the US-indicted tycoon Chen Zhi being escorted by armed police after his extradition to China from Cambodia, where authorities on Thursday ordered the liquidation of a bank he founded linked to a massive “scam centre”…
-
China-linked groups intensify attacks on Taiwan’s critical infrastructure, NSB warns
Taiwan says China-linked cyberattacks on its energy sector rose tenfold in 2025, hitting critical infrastructure across nine sectors, with total incidents up 6%. Taiwan reports China-linked cyberattacks on its energy sector surged tenfold in 2025, targeting critical infrastructure across nine sectors, with total incidents up 6% YoY. Taiwan’s National Security Bureau (NSB) reports China launched…
-
BlueDelta Hackers Target Microsoft OWA, Google, and Sophos VPN to Steal Credentials
A sophisticated credential-harvesting operation conducted by BlueDelta, a Russian state-sponsored threat group linked to the GRU’s Main Directorate, targeted critical infrastructure organizations and research institutions throughout 2025, according to a comprehensive investigation by Recorded Future’s Insikt Group. The campaign, spanning February through September 2025, represents a significant evolution in the group’s persistent credential-theft operations, with…
-
Die wichtigsten CISO-Trends für 2026
Tags: ai, ciso, compliance, cyersecurity, group, nis-2, resilience, risk, risk-management, software, supply-chain, tool, zero-trustLesen Sie, vor welchen Herausforderungen CISOs mit Blick auf das Jahr 2026 stehen.Das Jahr 2025 war für viele CISOs herausfordernd. Anfang des Jahres wurden mit dem Digital Operational Resilience Act (DORA) alle Finanzunternehmen dazu verpflichtet, ihre Cybersicherheit zu erhöhen. Zudem mussten sich in diesem Jahr zahlreiche Unternehmen mit der NIS2-Umsetzung auseinandersetzen. Vor welchen Schwierigkeiten stehen…
-
Ransomware Hits a Claims Giant: What the Sedgwick Breach Reveals About Modern Extortion Attacks
A recent breach disclosure reveals that claims management firm Sedgwick was targeted by the TridentLocker ransomware group, with attackers claiming to have exfiltrated sensitive data from systems supporting its government services operations before deploying ransomware, according to Cybersecurity News. While Sedgwick has not disclosed full technical details, the incident follows a well-established ransomware playbook. Attackers…
-
Alleged scam kingpin Chen Zhi extradited to China after Cambodia arrest
Chen founded the Prince Group, a multinational conglomerate authorities allege served as a front for ‘one of Asia’s largest transnational criminal organisations'<a href=”https://www.theguardian.com/world/2025/oct/17/chen-zhi-prince-group-cambodia-cyber-crime-sanctioned”>Chinese-born tycoon Chen Zhi, who was indicted by the US on fraud and money-laundering charges for running a multibillion-dollar online scam network from Cambodia, has been arrested there and extradited to China, Phnom…
-
Orthopedic Practice Pays $500K Settlement to NYS in Hack
2023 Incident Affected More Than 650,000 Patients, Employees. An upstate New York orthopedic practice has agreed to pay state regulators a $500,000 settlement and implement stronger security practices following a 2023 hack involving the theft of 650,000 individuals’ sensitive information. Cybercrime group INC Ransom reportedly claimed credit for the incident. First seen on govinfosecurity.com Jump…
-
ToddyCat Malware Exploits ProxyLogon to Compromise Microsoft Exchange Servers
ToddyCat, a sophisticated cyber-espionage threat group also known as Websiic and Storm-0247, has emerged as a significant risk to organizations across Europe and Asia. The group’s operations, which began in December 2020 by targeting Microsoft Exchange servers in Taiwan and Vietnam, have since evolved into complex, multi-stage campaigns that leverage advanced evasion techniques and specialized…
-
How to eliminate IT blind spots in the modern, AI-driven enterprise
Tags: access, ai, api, attack, automation, awareness, cio, cloud, control, data, detection, endpoint, governance, group, identity, injection, intelligence, metric, monitoring, network, radius, risk, service, technology, tool, training, vulnerabilityThe more organizations lean on artificial intelligence (AI), spread workloads across different environments, and tie systems together, the harder it becomes for traditional security practices to present a complete picture of what’s going on. The result is a growing number of blind spots hidden misconfigurations, inconsistent controls, and unpredictable behaviors across systems and AI agents…
-
How to eliminate IT blind spots in the modern, AI-driven enterprise
Tags: access, ai, api, attack, automation, awareness, cio, cloud, control, data, detection, endpoint, governance, group, identity, injection, intelligence, metric, monitoring, network, radius, risk, service, technology, tool, training, vulnerabilityThe more organizations lean on artificial intelligence (AI), spread workloads across different environments, and tie systems together, the harder it becomes for traditional security practices to present a complete picture of what’s going on. The result is a growing number of blind spots hidden misconfigurations, inconsistent controls, and unpredictable behaviors across systems and AI agents…
-
DDoSia Powers Affiliate-Driven Hacktivist Attacks
Pro-Russian group NoName057(16) uses a custom denial-of-service tool to mobilize volunteers and disrupt government, media, and institutional sites tied to Ukraine and the West. First seen on darkreading.com Jump to article: www.darkreading.com/cyberattacks-data-breaches/ddosia-powers-volunteer-driven-hacktivist-attacks
-
Flare Researchers Analyze SafePay Ransomware Leak Data
Flare researchers analyzed SafePay leak data, showing how the group targets regulated SMBs to maximize pressure. First seen on esecurityplanet.com Jump to article: www.esecurityplanet.com/threats/flare-researchers-analyze-safepay-ransomware-leak-data/
-
New Zealand Probes Ransomware Hack of Health Portal
More Than 100,000 Affected by Hack Detected on Dec. 30. The New Zealand government is probing a year-end ransomware hack of private healthcare service provider Manage My Health that impacted thousands of patients. Digital extortion group Kazu has claimed responsibility and threatened to leak the data on Jan. 15 unless it receives a $60,000 ransom.…
-
Taiwan subjected to 2.6 million Chinese cyberattacks a day in 2025
This article originally appeared on ComputerSweden.More on cyberattacks:Cybersecurity firm turns tables on threat actors with decoy data trapIranian APT Prince of Persia returns with new malware and C2 infrastructure’Ink Dragon’ threat group targets IIS servers to build stealthy global network First seen on csoonline.com Jump to article: www.csoonline.com/article/4112834/taiwan-subjected-to-2-6-million-chinese-cyberattacks-a-day-in-2025.html
-
How the Organizational Risk Culture Standard can supercharge your cybersecurity culture
Tags: automation, ceo, communications, compliance, control, cyber, cybersecurity, data, detection, email, finance, framework, group, guide, intelligence, law, metric, nist, phishing, ransomware, RedTeam, resilience, risk, tool, updateThe 10 dimensions, translated for cybersecurity: The ORCS framework defines ten dimensions. Treat them as a system. Each one is distinct; together they are complete. Leadership & governance. Leaders set the tone, model the behavior and anchor accountability. If leaders treat cyber as only an IT issue, everyone else will, too. When leaders make risk-informed…
-
Crimson Collective Claims Alleged Breach of Brightspeed Fiber Network
A threat actor group operating under the name >>Crimson Collective
-
Cybersecurity firm turns tables on threat actors with decoy data trap
Evidence of real breach remains thin: Despite Resecurity’s detailed account, the threat actors have not backed up their original claims with additional verifiable evidence. After posting the screenshots, no substantiated leaks of internal systems or actual client data have appeared. Independent analysis by various cybersecurity researchers supports Resecurity’s assertion that no production assets were compromised.On…
-
Cybersecurity firm turns tables on threat actors with decoy data trap
Evidence of real breach remains thin: Despite Resecurity’s detailed account, the threat actors have not backed up their original claims with additional verifiable evidence. After posting the screenshots, no substantiated leaks of internal systems or actual client data have appeared. Independent analysis by various cybersecurity researchers supports Resecurity’s assertion that no production assets were compromised.On…
-
Inside 2025’s Top Threat Groups: Why Familiar Actors Still Have the Upper Hand
New research reveals how ransomware groups like LockBit and Black Basta exploit visibility gaps, leaving security teams struggling to keep pace. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/01/inside-2025s-top-threat-groups-why-familiar-actors-still-have-the-upper-hand/
-
Resecurity Caught ShinyHunters in Honeypot
Resecurity caught ShinyHunters (SLH) using decoy accounts; the group attacked airlines, telecoms, and law enforcement in Sept 2025. In an interesting development, Resecurity has caught actors known as “ShinyHunters” or >>Scattered Lapsus$ Hunters
-
Hackers claim to hack Resecurity, firm says it was a honeypot
The ShinyHunters hacking group claims it breached the systems of cybersecurity firm Resecurity and stole internal data, while Resecurity says the attackers only accessed a deliberately deployed honeypot containing fake information used to monitor their activity. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/hackers-claim-resecurity-hack-firm-says-it-was-a-honeypot/
-
Hackers claim to hack Resecurity, firm says it was a honeypot
The ShinyHunters hacking group claims it breached the systems of cybersecurity firm Resecurity and stole internal data, while Resecurity says the attackers only accessed a deliberately deployed honeypot containing fake information used to monitor their activity. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/hackers-claim-resecurity-hack-firm-says-it-was-a-honeypot/
-
ShinyHunters claims Resecurity hack, firm says it’s a honeypot
The ShinyHunters hacking group claims it breached the systems of cybersecurity firm Resecurity and stole internal data, while Resecurity says the attackers only accessed a deliberately deployed honeypot containing fake information used to monitor their activity. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/shinyhunters-claims-resecurity-hack-firm-says-its-a-honeypot/
-
ShinyHunters Claim Breach of US Cybersecurity Firm Resecurity
The hacking group ShinyHunters has claimed responsibility for breaching Resecurity, a US-based cybersecurity company headquartered in Los Angeles…. First seen on hackread.com Jump to article: hackread.com/shinyhunters-breach-us-cybersecurity-resecurity-firm/
-
Eine neue Klasse operativer und sicherheitsrelevanter Risiken: KI-Agenten
OWASP hat erstmals die Top 10 for Agentic Applications veröffentlicht. Der Bericht macht deutlich, welche erheblichen geschäftlichen Risiken von agentischer KI ausgehen können insbesondere, weil diese Systeme eigenständig Entscheidungen treffen und ohne menschliches Eingreifen handeln [1]. Dazu ein Kommentar von Keren Katz, Co-Lead, OWASP Agentic AI Project; Senior Group Manager of AI Security,… First seen…
-
Cybersecurity Snapshot: Predictions for 2026: AI Attack Acceleration, Automated Remediation, Custom-Made AI Security Tools, Machine Identity Threats, and More
Tags: access, ai, attack, automation, breach, ciso, cloud, computer, conference, control, cyber, cybersecurity, data, data-breach, defense, detection, exploit, governance, group, identity, intelligence, mitigation, risk, service, threat, tool, zero-dayIn this special edition, Tenable leaders forecast key 2026 trends, including: AI will make attacks more plentiful and less costly; machine identities will become the top cloud risk; preemptive cloud and exposure management will dethrone runtime detection; and automated remediation gets the go-ahead. Key takeaways AI will supercharge the speed and volume of traditional cyber…

