The notorious Prince of Persia hacking group has resurfaced, deploying advanced malware and exploiting Telegram for stealthy command and control operations against critical infrastructure worldwide.
The Iranian state-sponsored 'Prince of Persia' hacking group has reemerged with sophisticated malware and Telegram-based command-and-control, targeting critical infrastructure worldwide. Investigators reveal new tactics and evolving threats in this cyber-espionage campaign.
The U.S. escalates its cyber counteroffensive by posting a $10 million bounty for information on Iranian hackers tied to the IRGC, spotlighting a shadowy group responsible for global cyberattacks and election meddling.
Iranian-backed MuddyWater hackers have unleashed a new cyber-espionage campaign targeting Windows users in Turkey, Israel, and Azerbaijan. Using sophisticated phishing lures, the group deploys the UDPGangster backdoor and CastleRAT trojan to bypass security and maintain covert control, leveraging advanced anti-analysis and privilege escalation techniques.
Iranian hackers now use cyberattacks to scout, guide, and assess missile strikes against real-world targets, blending digital espionage with military force in a dramatic shift in modern warfare.
Iranian-affiliated hackers tracked ship movements and CCTV feeds to support missile attacks, marking a dangerous fusion of cyber espionage and real-world warfare in global shipping lanes.
Amazon exposes how Iranian hackers use cyber intrusions to enable real-world missile strikes, marking a dramatic shift in how digital espionage now shapes modern warfare and security.
Iranian group UNC1549 stealthily targets aerospace and defense firms using DEEPROOT and TWOSTROKE malware, exploiting supply chain weaknesses and sophisticated phishing to steal sensitive data.
Iranian state-backed hackers are targeting defense and government officials with sophisticated social engineering and malware, expanding attacks to family members and using encrypted messaging platforms.
Iranian state-backed hackers are targeting defense and government officials with sophisticated social engineering and malware, expanding attacks to family members and using encrypted messaging platforms.