
APT28 Targets Ukrainian UKR-net Users in Long-Running Credential Phishing Campaign
The Russian state-sponsored threat actor known as APT28 has been attributed to what has been described as a "sustained" credential-harvesting campaign targeting users of UKR[.]net, a webmail and news...
Source: This article was originally published on The Hacker News
Read full article on source →Related Articles
Sonicwall warns of new SMA1000 zero-day exploited in attacks
SonicWall warned customers today to patch a vulnerability in the SonicWall SMA1000 Appliance Management Console (AMC) that was chained in zero-day attacks to escalate privileges. [...]

Let’s Make Hardened Images the Seatbelts of Software
No automaker asks you to pay extra for a seatbelt. The cost is baked into the price of every car because seatbelts prevent harm at an acceptable marginal cost. It’s not even a conversation anymore....

Async Programming in Rust: Understanding Futures and Tokio
As modern software demands ever-increasing performance and responsiveness, traditional synchronous programming can become a bottleneck. In server applications, network requests, disk operations and...

Attackers Use Stolen AWS Credentials in Cryptomining Campaign
Threat actors wielding stolen AWS Identity and Access Management (IAM) credentials leverage Amazon EC and EC2 infrastructure across multiple customer environments.
Critical React2Shell flaw exploited in ransomware attacks
A ransomware gang exploited the critical React2Shell vulnerability (CVE-2025-55182) to gain initial access to corporate networks and deployed the file-encrypting malware less than a minute later....

Analysis Surfaces Rising Wave of Software Defects Traced to AI Coding Tools
An analysis of 470 real-world open source pull requests published today finds code generated using artificial intelligence (AI) tools introduces significantly more defects across every major category...