Netcrook

Threat Actors

2371 article(s)

Google Hits Chinese Proxy Network Linked to Global Cyber Attacks

🗓 16 Apr 2026 · 👤 LOGICFALCON · 🌍 Asia

Google has uncovered and disrupted a Chinese proxy network company allegedly powering a new generation of mass cyber weapons. The operation highlights the growing risks as legitimate internet tools are repurposed for global cybercrime and espionage.

Fake Adobe Reader Installers Used to Deploy ScreenConnect Backdoors

🗓 16 Apr 2026 · 👤 CRYSTALPROXY

A new cybercrime campaign uses fake Adobe Reader installers to deploy ScreenConnect, granting hackers covert access to enterprise systems. Discover the attack chain, evasion tactics, and critical defense strategies.

Middle Eastern Brute-Force Attacks Surge Amid Geopolitical Tensions

🗓 14 Apr 2026 · 👤 LOGICFALCON · 🌍 Middle-East

A sweeping wave of brute-force cyberattacks originating from the Middle East targeted firewalls and VPNs in early 2026, with evidence suggesting links to geopolitical conflict and state-backed hackers.

How Hackers Exploit GitHub and GitLab for Malware and Phishing | Netcrook – Criminal Chronicles

🗓 10 Apr 2026 · 👤 CRYSTALPROXY

Threat actors are weaponizing trusted platforms like GitHub and GitLab to deliver malware and launch sophisticated phishing campaigns. Discover how these attacks bypass traditional security and what it means for users and enterprises.

How Emojis Became Cybercriminals’ Secret Weapon in Digital Attacks

🗓 08 Apr 2026 · 👤 LOGICFALCON · 🌍 Asia

Emojis are no longer just playful icons—they’re now key tools for cybercriminals to mask commands, evade detection, and run global operations. Discover how this visual code is changing the rules of cyber warfare.

Stealth in the Kernel: BPFDoor’s New Tricks Threaten Telecom Networks

🗓 08 Apr 2026 · 👤 CRYSTALPROXY

BPFDoor, the infamous kernel-level backdoor, has evolved with new variants that hide in plain sight, use advanced command and control routing, and target critical telecom hardware. Security teams must adapt to detect these nearly invisible threats.

Global Games, Global Targets: Inside the Cybersecurity Battles at the Olympics and World Cup

🗓 07 Apr 2026 · 👤 LOGICFALCON · 🌍 Europe

The Olympics and FIFA World Cup aren’t just athletic spectacles—they’re digital battlegrounds attracting hackers, state actors, and cybercriminals. Explore the high-stakes world of event cybersecurity, the latest threats, and the frontline lessons for organizations everywhere.

Shadow Games: Inside the Global Crackdown on Russian Router Hijackers

🗓 07 Apr 2026 · 👤 CRYSTALPROXY · 🌍 Europe

A Russian state-backed hacking group hijacked thousands of routers globally to steal Microsoft 365 logins. Authorities and tech giants joined forces to dismantle the FrostArmada campaign, exposing new vulnerabilities in everyday devices.

Shadow Over the Cloud: Iranian Hackers Wage Stealth War on Middle East Microsoft 365 Users

🗓 07 Apr 2026 · 👤 LOGICFALCON · 🌍 Middle-East

A covert, Iran-linked campaign is targeting Microsoft 365 users in the Middle East with advanced password spraying and stealth tactics, threatening critical sectors and raising the stakes in regional cyber conflict.

Iran-Linked Hackers Launch Coordinated Attack on Middle East Microsoft 365 Networks

🗓 07 Apr 2026 · 👤 CRYSTALPROXY · 🌍 Middle-East

A major Iranian-linked cyber campaign struck Microsoft 365 environments across the Middle East in March 2026, targeting municipalities, government agencies, and critical sectors with password spraying tactics. The attack highlights the growing overlap between digital espionage and kinetic conflict.

1   2   3   4   5   Next »