CERT-UA Discovers LAMEHUG Malware Linked to APT28, Using LLM for Phishing Campaign

Jul 18, 2025Ravie LakshmananCyber Attack / Malware The Computer Emergency Response Team of Ukraine (CERT-UA) has…

Lava Blaze Dragon India Launch Set for July 25; Design and Amazon Availability Confirmed

Lava Blaze Dragon is confirmed to launch in India in July. Notably, the Lava Blaze AMOLED…

Deepfakes. Fake Recruiters. Cloned CFOs — Learn How to Stop AI-Driven Attacks in Real Time

Jul 16, 2025The Hacker NewsAI Security / Fraud Detection Social engineering attacks have entered a new…

iPhone 17 Pro Colour Options Leaked Again; Could Launch in Previously Unseen Shades

iPhone 17 leaks have been growing in numbers as the rumoured launch timeline nears. There have…

Chinese Hackers Target Taiwan’s Semiconductor Sector with Cobalt Strike, Custom Backdoors

The Taiwanese semiconductor industry has become the target of spear-phishing campaigns undertaken by three previously undocumented…

JWST Finds Black Hole Between Galaxy Cores, Hinting at Rare Direct Collapse Birth

Astronomers have detected a weird black hole that is causing its galactic host to wobble like…

What Security Leaders Need to Know in 2025

The modern-day threat landscape requires enterprise security teams to think and act beyond traditional cybersecurity measures…

Uranus Found Emitting Internal Heat, Reviving Hopes for Flagship NASA Mission

Uranus, the seventh planet from the Sun, is usually known as a frozen “ice giant.” But…

Hackers Use GitHub Repositories to Host Amadey Malware and Data Stealers, Bypassing Filters

Jul 17, 2025Ravie LakshmananMalware / Social Engineering Threat actors are leveraging public GitHub repositories to host…

Transverse Thomson Effect Observed Experimentally: Unlocking New Possibilities in Thermal Management

In a recent paper published online, researchers have reported the transverse Thomson effect’s first experimental observation.…