North Korea's Sapphire Sleet group is targeting macOS users with fake recruiter profiles and a social engineering technique known as ClickFix, tricking victims into running malicious scripts that steal sensitive data and crypto wallets. Microsoft and Apple are racing to counter this evolving threat.
Google has uncovered and disrupted a Chinese proxy network company allegedly powering a new generation of mass cyber weapons. The operation highlights the growing risks as legitimate internet tools are repurposed for global cybercrime and espionage.
Two New Jersey men received lengthy prison terms for operating a laptop farm that enabled North Korean operatives to pose as U.S. IT workers, infiltrate major companies, and funnel millions back to the DPRK.
Marino Food Products Pvt, a leading food manufacturer, faces operational chaos after a ransomware attack. Sensitive data was posted on a criminal leak site, disrupting supply chains and exposing industry vulnerabilities.
A suburban laptop farm in New Jersey became the unlikely gateway for North Korean operatives to infiltrate over 100 U.S. companies, steal millions, and exfiltrate sensitive data. This feature unpacks the technical tricks and real-world impact behind the headline-making case.
The Optocam Zero is reigniting interest in DIY digital photography with its blend of classic charm and modern features. Explore how this open-source camera is empowering users to reclaim control, privacy, and creativity in a smartphone-dominated world.
For six years, cybercriminals have quietly targeted Turkish homes and SMBs with a low-profile ransomware campaign, collecting modest ransoms at scale while escaping the media spotlight.
Samsung’s latest price increases on US smartphones and tablets reveal a deeper crisis in the tech supply chain: a global shortage of memory chips, fueled by the growing demand for AI infrastructure.
Asia’s digital supply chains are under siege from complex, cross-border risks. With fragmented regulations, unchecked third-party vendors, and a surge in AI adoption, organizations must rethink security to defend against emerging threats.
Discount hard drives may seem like a steal, but a Netcrook investigation finds that many are recycled without proper data wiping—leaving private photos, confidential files, and more exposed to the next buyer.