Webloc: Adtech-Based Geolocation Surveillance and the Risks for Mobile Privacy

Multi-agency team reviewing intelligence data on large screens in a command center.

The global digital advertising ecosystem is no longer just about targeting consumers with personalized ads. According to a new report by Citizen Lab, the same infrastructure now powers large-scale, covert geolocation surveillance of mobile users worldwide. At the center of this development is Webloc, a commercial tool that leverages advertising data to track people’s movements … Read more

North Korean APT37 Exploits Facebook Social Engineering to Deploy RokRAT Spyware

USB drive with ZIP logo, CD, and a rusty padlock on wooden surface.

A new cyber‑espionage operation attributed to the North Korean threat group APT37 (ScarCruft) demonstrates how quickly social networks are becoming an initial access vector for state‑sponsored attacks. By building trust on Facebook and then moving conversations to encrypted messengers, the operators convince victims to install a “secure PDF viewer” that in reality delivers the long‑running … Read more

CPUID Website Compromise Turns CPU-Z Downloads into STX RAT Malware Vector

** Aerial view of a city with modern and informal settlements, featuring data flow paths.

For a brief period in April, the official CPUID website (cpuid[.]com) – home to widely used hardware monitoring tools such as CPU-Z, HWMonitor, HWMonitor Pro and PerfMonitor – was compromised and used to distribute a remote access trojan. Users who believed they were downloading legitimate utilities instead received trojanized installers delivering the STX RAT malware. … Read more

Adobe Acrobat and Reader Zero-Day CVE-2026-34621: What You Need to Know and How to Respond

Digital chaos depicted with a hacker, explosive device, and looming skull in dark landscape.

Adobe has released emergency security updates for Adobe Acrobat and Adobe Acrobat Reader after the discovery of a critical vulnerability, CVE-2026-34621, that is already being actively exploited. The flaw allows attackers to execute malicious code on a victim’s system simply by tricking them into opening a specially crafted PDF file, making it a powerful tool … Read more

Chaos Botnet Evolves: New Malware Variant Targets Misconfigured Cloud Infrastructure

** Technician working with equipment on a rooftop overlooking a scenic landscape.

A new variant of the Chaos botnet malware is shifting its focus from home routers and edge devices to misconfigured cloud infrastructure, turning vulnerable Hadoop and similar services into powerful, anonymized nodes for criminal operations. This evolution reflects a broader trend: modern botnets increasingly abuse cloud platforms not only for distributed denial-of-service (DDoS) attacks, but … Read more

OpenAI Revokes macOS Code Signing Certificate After Axios and Trivy Supply Chain Attacks

Aerial view of a tech landscape featuring OpenAI and connectivity lines.

OpenAI has disclosed that a compromised Axios npm package was executed inside its macOS application signing pipeline on GitHub Actions. According to the company, no customer data or internal systems were breached, but its macOS code signing certificate is being treated as potentially exposed and is undergoing revocation and rotation — a significant event for … Read more

FBI and Indonesian Police Take Down W3LL Phishing Kit Targeting Microsoft 365

FBI agents arresting a suspect amidst explosions and computer monitors in a tense scene.

US Federal Bureau of Investigation (FBI) agents, working with Indonesia’s National Police, have dismantled the infrastructure behind the W3LL phishing kit, a global cybercrime service used to steal thousands of user credentials and attempt fraud schemes exceeding $20 million. During the coordinated action, law enforcement arrested the alleged developer, identified as G.L., and seized multiple … Read more

Identity Dark Matter: Why Half of Corporate Access Remains Invisible and How IVIP Changes That

Futuristic scene with figures overlooking a digital universe and cosmic elements.

As large enterprises expand their digital footprint, classical Identity and Access Management (IAM) platforms are reaching their limits. User accounts, machine identities and AI agents are spread across thousands of applications, cloud services and autonomous teams. A significant part of identity activity is no longer visible to security operations, creating a dangerous blind spot in … Read more

Quantum Breakthroughs Intensify Threat to Elliptic-Curve Cryptography

Aerial view of Googleplex showcasing the circular venue and surrounding landscape.

Two independent research teams have released preprints indicating that the quantum resources required to break elliptic‑curve cryptography (ECC) may be orders of magnitude lower than estimates from only a few years ago. Since ECC underpins the security of Bitcoin, Ethereum, TLS certificates, and many digital signature schemes, this shift significantly impacts how long today’s cryptography … Read more