Tag: intelligence
-
Iran-linked actors use Telegram as C2 in malware attacks on dissidents
Iran-linked actors use Telegram as C2 to spread malware targeting dissidents and journalists, enabling surveillance and data theft. The FBI warns that Iran’s Ministry of Intelligence and Security (MOIS) runs cyber campaigns using Telegram as a command-and-control infrastructure to deliver malware. Threat actors target Iranian dissidents, journalists, and opposition groups worldwide. Once deployed, the malware…
-
FBI warns of Handala hackers using Telegram in malware attacks
The U.S. Federal Bureau of Investigation (FBI) warned network defenders that Iranian hackers linked to the country’s Ministry of Intelligence and Security (MOIS) are using Telegram in malware attacks. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/fbi-warns-of-handala-hackers-using-telegram-in-malware-attacks/
-
Russian hackers go after high-value targets through Signal
Russian intelligence-linked hackers are targeting commercial messaging platforms, with Signal a primary focus, the FBI and CISA warn. The campaign is aimed at individuals of … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/03/23/russian-hackers-signal-phishing-campaign/
-
A Domains Portfolio Belonging to RAMP (Russian Anonymous Marketplace) Forum Members A Compilation
Dear blog readers, In this post I’ll provide actionable intelligence based on the research and analysis which I posted in my previous “Dissecting the RAMP (Russian Anonymous Marketplace) Ransomware Forum – An Analysis” blog post and will provide actionable intelligence on various domain portfolios manage and operated by members of the RAMP (Russian Anonymous Marketplace)…
-
A Compilation of BitCoin Wallet Addresses from the RAMP (Russian Anonymous Marketplace) Forum Members A Compilation
Dear blog readers, In this post I’ll provide actionable intelligence on all the BitCoin wallet addresses from the RAMP (Russian Anonymous Marketplace) forum members with the idea to assist the security community fellow researchers and U.S Law Enforcement on its way to properly track down and prosecute the individuals behind these campaigns. Here’s the compilation:…
-
Russia-linked actors target WhatsApp and Signal in phishing campaign
Russia-linked actors target WhatsApp and Signal accounts of officials and journalists via phishing, gaining access to messages and contacts. Threat actors linked to Russian Intelligence Services are running phishing campaigns to hijack high-value accounts on messaging apps like WhatsApp and Signal, the FBI warns. >>The FBI has identified cyber actors associated with Russian Intelligence Services targeting…
-
FBI Warns of Russian Intelligence Hijacking Encrypted Messaging Apps
The post FBI Warns of Russian Intelligence Hijacking Encrypted Messaging Apps appeared first on Daily CyberSecurity. First seen on securityonline.info Jump to article: securityonline.info/fbi-warns-russian-intelligence-phishing-signal-messaging-apps/
-
What Is Physical AI, and What Does It Mean for Government?
From Davos insights to state readiness, let’s explore how robotics and sensors are moving artificial intelligence into the physical world. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/03/what-is-physical-ai-and-what-does-it-mean-for-government/
-
NVIDIA Takes AI Computing to Orbit With New Space Platforms
NVIDIA is sending its chips to space. At GTC 2026, the company announced a suite of accelerated computing platforms designed to bring data-center-class AI to orbital data centers, geospatial intelligence and autonomous space operations. The headline product is the Space-1 Vera Rubin Module, which delivers up to 25x more AI compute for space-based inferencing compared..…
-
Real Attack Alert Analysis: From Hidden Indicators to Actionable Threat Intelligence
Executive Overview Cyber threats are evolving rapidly, becoming more stealthy, automated, and difficult to detect using traditional security approaches. Attackers increasingly rely on legitimate system tools, encrypted communication, and internal reconnaissance to bypass defenses and operate unnoticed within enterprise environments. Modern organizations must shift toward intelligence-driven security that focuses on behavior, context, and correlation rather…
-
FBI Warns Russian Hackers Target Signal, WhatsApp in Mass Phishing Attacks
Tags: attack, control, cybersecurity, hacker, infrastructure, intelligence, phishing, russia, service, threatThreat actors affiliated with Russian Intelligence Services are conducting phishing campaigns to compromise commercial messaging applications (CMAs) like WhatsApp and Signal to seize control of accounts belonging to individuals with high intelligence value, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) and Federal Bureau of Investigation (FBI) said Friday.”The campaign First seen on thehackernews.com Jump…
-
FBI and CISA Flag Russian Cyber Operations Targeting Select Individuals via Signal
Tags: advisory, cisa, cyber, cybersecurity, encryption, infrastructure, intelligence, phishing, russia, serviceThe Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) have recently released a joint cybersecurity advisory regarding a widespread phishing campaign. The alert warns that Russian Intelligence Services are actively targeting users of encrypted messaging applications, primarily Signal. The attackers are bypassing the platform’s robust end-to-end encryption by hijacking user…
-
TDL 018 – How To Think, Not What To Think – Mitch Prior
Tags: access, ai, apple, attack, backup, blockchain, business, cctv, china, ciso, cloud, computer, conference, control, credentials, cvss, cyber, cybersecurity, data, defense, detection, exploit, finance, firmware, google, infrastructure, intelligence, Internet, iot, jobs, law, mail, malware, military, network, phone, privacy, resilience, risk, router, software, strategy, switch, technology, threat, tool, vulnerability, wifi, zero-trustThe Human Algorithm in a Zero-Trust World In the latest episode of The Defender’s Log, host David Redekop sits down with cybersecurity expert Mitch Prior to discuss the intersection of high-tech security and human intuition. From their first meeting in 2018″, the early days of Zero Trust”, the duo explores why the “why” behind technical…
-
FBI links Signal phishing attacks to Russian intelligence services
The FBI has issued a public service announcement warning that Russian intelligence-linked threat actors are actively targeting users of encrypted messaging apps such as Signal and WhatsApp in phishing campaigns that have already compromised thousands of accounts. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/fbi-links-signal-phishing-attacks-to-russian-intelligence-services/
-
FBI, CISA issue PSA on Russian intelligence campaign to target messaging apps
It echoes earlier alerts from the Netherlands and Germany, and is the latest to warn about targeting of Signal users and others. First seen on cyberscoop.com Jump to article: cyberscoop.com/fbi-cisa-issue-psa-on-russian-intelligence-campaign-to-target-messaging-apps/
-
FBI takes down leak sites tied to Iran’s Ministry of Intelligence and Security
In a 40-page seizure warrant, the FBI outlined multiple digital campaigns launched by Iran’s Ministry of Intelligence and Security (MOIS) through a variety of online monikers, most recently going by the name “Handala.” First seen on therecord.media Jump to article: therecord.media/fbi-takes-down-leak-sites-iran-mois
-
DOJ confirms seizure of domains linked to Iran-backed threat actor
A group connected to Iranian intelligence used the same infrastructure to claim credit for the hack of medical technology firm Stryker.; First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/doj-seizure-domains-iran-threat-actor/815306/
-
Gefälschte Schutz-App für Krypto-Wallets stiehlt Nutzerdaten
Okta Threat Intelligence hat eine gefährliche Kryptoscam-Kampagne namens <> aufgedeckt und ihre Infrastruktur zerschlagen. Die als Browser-Erweiterung beworbene Anwendung versprach Nutzern, ihre Krypto-Wallet vor Phishing und Betrug zu schützen in Wirklichkeit war sie jedoch ein Trojaner, der gezielt Wallet-Adressen und sensible Daten von Binance, Coinbase, Metamask, Opensea, Phantom und Uniswap abgriff. Sogar Nutzer von […]…
-
The Importance of Behavioral Analytics in AI-Enabled Cyber Attacks
Artificial Intelligence (AI) is changing how individuals and organizations conduct many activities, including how cybercriminals carry out phishing attacks and iterate on malware. Now, cybercriminals are using AI to generate personalized phishing emails, deepfakes and malware that evade traditional detection by impersonating normal user activity and bypassing legacy security models. As a result, First seen…
-
The espionage reality: Your infrastructure is already in the collection path
Tags: access, apt, attack, authentication, breach, ciso, cloud, country, cyber, data, detection, espionage, exploit, governance, government, group, identity, infrastructure, injection, insurance, intelligence, network, risk, risk-assessment, service, spyware, theft, threat, toolCommercial spyware as an intelligence channel: Criminal operators deploying Predator, a spyware suite sold by the sanctioned Intellexa consortium, have been documented across more than a dozen countries. US sanctions haven’t slowed them down an iota. Their targets are not random: journalists, activists, politicians, human”‘rights defenders, government employees and contractors, and other high”‘value individuals. Why?…
-
The espionage reality: Your infrastructure is already in the collection path
Tags: access, apt, attack, authentication, breach, ciso, cloud, country, cyber, data, detection, espionage, exploit, governance, government, group, identity, infrastructure, injection, insurance, intelligence, network, risk, risk-assessment, service, spyware, theft, threat, toolCommercial spyware as an intelligence channel: Criminal operators deploying Predator, a spyware suite sold by the sanctioned Intellexa consortium, have been documented across more than a dozen countries. US sanctions haven’t slowed them down an iota. Their targets are not random: journalists, activists, politicians, human”‘rights defenders, government employees and contractors, and other high”‘value individuals. Why?…
-
Angreifer umgehen NLP-basierte E-Mail-Erkennung
Cyberkriminelle sind ständig auf der Suche nach neuen Wegen, um moderne Sicherheitsmechanismen zu unterlaufen. Eine aktuell beobachtete Methode zielt dabei auf die Umgehung von Natural-Language-Processing-Funktionen (NLP) in E-Mail-Sicherheitslösungen ab. Wie die Sicherheitsforscher des Threat-Intelligence-Teams von KnowBe4 herausgefunden haben, ergänzen Angreifer ihre Phishing-Mails zunehmend um zusätzliche Zeichen, Zeilenumbrüche und legitime Links. Damit verstecken sie schädliche Inhalte…
-
FBI Data Purchases Ignite New Clash Over Privacy and Surveillance
Lawmakers pressed the FBI this week after Director Kash Patel confirmed the agency is purchasing information that can track Americans’ movements, reopening a contentious debate over privacy and the limits of government surveillance. The acknowledgment came during a Senate Intelligence Committee hearing, where Patel said the bureau buys data from private vendors as part of..…
-
FBI Data Purchases Ignite New Clash Over Privacy and Surveillance
Lawmakers pressed the FBI this week after Director Kash Patel confirmed the agency is purchasing information that can track Americans’ movements, reopening a contentious debate over privacy and the limits of government surveillance. The acknowledgment came during a Senate Intelligence Committee hearing, where Patel said the bureau buys data from private vendors as part of..…
-
FBI Data Purchases Ignite New Clash Over Privacy and Surveillance
Lawmakers pressed the FBI this week after Director Kash Patel confirmed the agency is purchasing information that can track Americans’ movements, reopening a contentious debate over privacy and the limits of government surveillance. The acknowledgment came during a Senate Intelligence Committee hearing, where Patel said the bureau buys data from private vendors as part of..…
-
US intel chiefs urge lawmakers to extend Section 702 surveillance power without changes
The remarks at the House Intelligence Committee’s annual hearing on worldwide threats offered the most vocal support for President Donald Trump’s strategy to date. First seen on therecord.media Jump to article: therecord.media/us-intel-chiefs-urge-lawmakers-to-extend-section-702
-
Bolster your defenses and close the codecloud gap with Tenable and OX
Tags: access, ai, application-security, attack, business, ciso, cloud, container, control, data, data-breach, defense, detection, endpoint, exploit, framework, identity, infrastructure, intelligence, Internet, risk, service, software, strategy, technology, threat, tool, training, vulnerabilityToday, cloud security teams face fragmented visibility and the challenge of prioritizing risks while identifying fix owners. A new joint solution from Tenable and OX helps you close the code-to-cloud gap from development through runtime. By combining CNAPP with deep AppSec, this integration is designed to eliminate visibility gaps and accelerate remediation. Key takeaways Bridge…
-
Russian hackers exploit Zimbra flaw in Ukrainian govt attacks
Tags: attack, exploit, flaw, government, hacker, intelligence, military, russia, service, ukraine, vulnerabilityHackers part of APT28, a state-backed threat group linked to Russia’s military intelligence service (GRU), are exploiting a Zimbra Collaboration Suite (ZCS) vulnerability in attacks targeting Ukrainian government entities. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/russian-apt28-military-hackers-exploit-zimbra-flaw-in-ukrainian-govt-attacks/

