The Visible Hand: How AI is Already Breaking the Security Model

Central banks are panicking over unreleased AI models while hackers are already using them to backdoor Hugging Face and close $100k crypto heists. The weaponized AI era is officially here.

Read More

The Attack Isn't Coming From a Stranger. It's Coming From Your GitHub Notifications.

Four active campaigns documented today share one design principle: the attack arrives from something the target already trusts. APT37 builds friendships on Facebook first. Attackers abuse GitHub and Jira notifications to deliver phishing links that pass SPF, DKIM, and DMARC. A fake rocket alert app spies on people in a conflict zone. AI-generated articles seed Google Discover with scareware.

Read More

North Korea Backdoored Axios for Three Hours. That Was Enough.

DPRK hackers hijacked the Axios npm package, deploying a self-erasing backdoor across 100 million weekly downloads. Three hours was all they needed.

Read More

The Progress We Thought We Were Making Against Hackers? It Just Went Backward.

Dwell time reversed in 2025, and the reason why tells you exactly which threats most security programs are not built to catch.

Read More

Inside the North Korean IT Worker Playbook: IBM and Flare's New Research Shows Exactly How They Get In

IBM and Flare published the most detailed technical breakdown yet of how North Korean IT workers infiltrate US companies, including specific detection controls security and HR teams can actually use.

Read More

How a Virginia Security Firm Set a Trap and Caught a North Korean Spy Applying for a Remote Job

Nisos set up a fake hiring scenario, handed a suspected DPRK worker a monitored laptop, and caught them. The most unsettling part: the companies already infiltrated had no idea until Nisos called.

Read More

The Insider Front Door: How Legitimate Access Keeps Becoming Extortion

A data analyst extorted his employer for $2.5M using access his job gave him. Three Americans helped North Korean operatives infiltrate US companies as fake IT workers. Different crimes, same root problem.

Read More

North Korea Behind Polyfill.io? Supply Chain Poisoning Just Got a State Sponsor

Forensic research links the Polyfill.io supply chain attack to a North Korean operative. The same week, a CVSS 9.8 RCE hits the simple-git npm library. Your dependency graph is your attack surface.

Read More

APT28's Covenant Trick and North Korea's AirDrop Hack: How Nation-States Borrow Their Tools

Russia's APT28 hijacked an open-source red-team tool to hit Ukraine. North Korea's UNC4899 used Apple AirDrop to break into a crypto firm. Both attacks exploit the trust we put in legit software.

Read More