Threatline

Cyber Security News From Around The World

Latest news as of 6/8/2025, 4:27:39 PM

The Register

2 days ago

Uncle Sam moves to seize $7.7M laundered by North Korean IT worker ring

The cash has been frozen for more than two years The US is looking to finally capture the $7.74 million it froze over two years ago after indicting alleged money launderers it claims are behind North Korean IT worker schemes.…

Graham Cluley

2 days ago

US offers $10 million reward for tips about state-linked RedLine hackers

How would you like to earn yourself millions of dollars? Well, it may just be possible - if you have information which could help expose the identities of cybercriminals involved with the notorious RedLine information-stealing malware. Read more in my article on the Tripwire State of Security blog.

Dark Reading

2 days ago

MSFT-CrowdStrike 'Rosetta Stone' for Naming APTs: Meh?

Microsoft and CrowdStrike announced an effort to deconflict the overlapping names of threat groups and reduce confusion for companies, but we've been here before.

Graham Cluley

2 days ago

Smashing Security podcast #420: Fake Susies, flawed systems, and fruity fixes for anxiety

A bizarre case of political impersonation, where Trump’s top aide Susie Wiles is cloned (digitally, not biologically — we think), and high-ranking Republicans start getting invitations to link up with "her" on Telegram to share their Trump pardon wishlists. Was it a deepfake? Or just someone with a halfway decent impression and access to a shady data broker? Meanwhile, we take a worryingly familiar journey into the mental health crisis in the UK — and how TikTok is stepping in with advice like “eat an orange in the shower” to cure your anxiety. Spoiler: it won’t. But it might make your bathroom smell nice. All this and more is discussed in the latest edition of the "Smashing Security" podcast by cybersecurity veterans Graham Cluley and Carole Theriault.

The Register

2 days ago

Your ransomware nightmare just came true – now what?

Don't negotiate unless you must, and if so, drag it out as long as you can So, the worst has happened. Computer screens all over your org are flashing up a warning that you've been infected by ransomware, or you've got a message that someone's been stealing information from your server.… Feature

The Hacker News

2 days ago

Inside the Mind of the Adversary: Why More Security Leaders Are Selecting AEV

Cybersecurity involves both playing the good guy and the bad guy. Diving deep into advanced technologies and yet also going rogue in the Dark Web. Defining technical policies and also profiling attacker behavior. Security teams cannot be focused on just ticking boxes, they need to inhabit the attacker’s mindset. This is where AEV comes in. AEV (Adversarial Exposure Validation) is an advanced

Dark Reading

2 days ago

Prep for Layoffs Before They Compromise Security

Mass layoffs create cybersecurity vulnerabilities through dormant accounts and disgruntled employees.

The Hacker News

2 days ago

New PathWiper Data Wiper Malware Disrupts Ukrainian Critical Infrastructure in 2025 Attack

A critical infrastructure entity within Ukraine was targeted by a previously unseen data wiper malware named PathWiper, according to new findings from Cisco Talos. "The attack was instrumented via a legitimate endpoint administration framework, indicating that the attackers likely had access to the administrative console, that was then used to issue malicious commands and deploy PathWiper across

Bleeping Computer

2 days ago

Police arrests 20 suspects for distributing child sexual abuse content

Law enforcement authorities from over a dozen countries have arrested 20 suspects in an international operation targeting the production and distribution of child sexual abuse material. [...]

Bleeping Computer

3 days ago

Google’s upcoming Gemini Kingfall is allegedly a coding beast

Google's AI advancement is not slowing down, and we might be getting yet another powerful model codenamed "Gemini Kingfall." [...]