Hijacked in the Cloud

Crypto miners, Tor obfuscation, and exposed Docker APIs — how misconfigurations are quietly draining your cloud. Threat actors are exploiting exposed Docker APIs to hijack cloud environments for cryptomining, using Tor for anonymity and deploying XMRig miners via a custom dropper script. Trend Micro researchers observed attackers mounting the host system through Docker containers, hidingContinue reading “Hijacked in the Cloud”

China’s LapDogs

A stealth cyber army of hacked routers is helping Beijing vanish in plain sight. Chinese state-backed hackers are covertly converting vulnerable IoT routers—especially Ruckus Wireless devices—into a stealth relay network dubbed “LapDogs,” using a custom backdoor called “ShortLeash” to hide espionage operations. These compromised nodes quietly route stolen data and mimic official sites like theContinue reading “China’s LapDogs”

Cyber Retaliation: 700% Surge

Iran-aligned hackers unleash digital warfare on Israel’s infrastructure after military strikes — and it’s only just begun. Cybersecurity firm Radware reports a 700% spike in cyberattacks on Israel within two days of its June 12 strikes on Iran. This surge, described as “unprecedented,” stems from retaliatory operations by Iranian state actors and pro-Iranian hacker groups.Continue reading “Cyber Retaliation: 700% Surge”

When Banks Break

Inside the War to Stop a Cyber Meltdown of the UK Financial System Imagine the nightmare: a cyberattack paralyzes a major UK bank, disrupting wages, mortgages, and digital payments across the country. This “reasonable worst-case scenario” drives intense spending, with banks like HSBC investing hundreds of millions in cyber defense. The financial sector, part ofContinue reading “When Banks Break”

Inside Canada’s Ransomware Wake-Up Call

What the Nova Scotia Power hack exposed—and why every grid is now a target. A ransomware attack hit Nova Scotia Power on March 19 but wasn’t discovered until April 25. Personal data of 280,000 customers—including SINs and bank details—was stolen. Despite this, the utility didn’t pay the ransom and has now secured $1.8 million inContinue reading “Inside Canada’s Ransomware Wake-Up Call”

The AI Security Playbook Begins

Congress pushes NSA to weaponize AI defenses before China strikes first. A bipartisan group in Congress has introduced the Advanced AI Security Readiness Act, which tasks the NSA with creating an “AI Security Playbook” to defend U.S. AI systems from foreign cyber threats. Led by Reps. Moolenaar, Krishnamoorthi, LaHood, and Gottheimer, the bill aims toContinue reading “The AI Security Playbook Begins”

China’s Cyber Trap Failed

How a failed breach on SentinelOne uncovered a global hacking campaign targeting 70+ critical infrastructure orgs. Chinese state-backed hackers attempted to infiltrate cybersecurity firm SentinelOne by probing its servers and compromising an IT vendor. Though the breach failed, SentinelOne uncovered evidence of a larger, global campaign targeting over 70 organizations in sectors like government, telecom,Continue reading “China’s Cyber Trap Failed”

Spyphones

China’s Silent Cyberwar Is Already in Your Pocket A mysterious smartphone crash affecting select individuals in government, tech, and media signaled a sophisticated, zero-click cyberattack likely linked to China. Investigators at iVerify tied the incidents to Chinese interests, noting that past targets had also drawn attention from Chinese hackers. As mobile devices grow more essentialContinue reading “Spyphones”

How Hackers Hijacked AI Security

Inside the Asus Router Botnet That Turned Defense Into a Weapon A newly uncovered botnet is targeting Asus RT-AC3100 and RT-AC3200 routers, exploiting their AI-powered security feature, AiProtection, for persistence. Detected by GreyNoise in March 2025, the multi-stage attack begins with brute-force attempts on “login.cgi” and older authentication bypass flaws. Once inside, attackers exploit aContinue reading “How Hackers Hijacked AI Security”