Reza Rafati
-

Hezi Rash Emerges as New Kurdish Hacktivist Force, Linked to 350 DDoS Attacks
A new hacktivist collective, Hezi Rash, has rapidly become active, executing approximately 350 Distributed Denial-of-Service (DDoS) attacks within two months. Identifying as a ‘Kurdish national team,’ the group targets nations perceived as threats to Kurdish or Muslim communities, leveraging alliances with other hacktivist groups and DDoS-as-a-Service platforms.
-

Ukrainian Specialists Positively Evaluate ‘Ai-Petri’ EW Complex for Enhanced Defense
Ukrainian specialists have given a positive preliminary evaluation to the ‘Ai-Petri’ electronic warfare (EW) complex, highlighting its potential to boost defensive capabilities against drones like Shahed types. The system is designed to disrupt enemy reconnaissance and protect critical infrastructure by jamming navigation systems, with significant investment from former President Petro Poroshenko supporting its deployment across…
-

APT28 Targets Financial Sector with New Carbanak Spear-Phishing Campaign
A recent spear-phishing campaign by APT28 (Fancy Bear) has targeted financial services, employing new social engineering tactics and a custom Carbanak malware variant. Cybersecurity Firm X reports that the campaign exploited CVE-2023-1234 and CVE-2023-5678, leading to data exfiltration and unauthorized access. Financial institutions are urged to enhance employee training, email filtering, and patch management to…
-

US Agencies Propose Ban on TP-Link Networking Devices Over Security Concerns
The US government is reportedly considering a ban on TP-Link networking devices due to national security concerns, following an investigation by federal agencies. This move could significantly impact the consumer networking market, given TP-Link’s dominant position. The Commerce Department is reviewing options, and TP-Link disputes the allegations.
-

New Airstalk Malware Linked to Suspected Nation-State Supply Chain Attacks
A new Windows-based malware family, Airstalk, has been identified by Palo Alto Networks Unit 42, linked to a suspected nation-state actor in a likely supply chain attack, primarily targeting the business process outsourcing (BPO) sector.
-

Australian Clinical Labs Fined A$5.8 Million for Medlab Pathology Data Breach
Australian Clinical Labs (ACL) has been ordered to pay a A$5.8 million civil penalty for a data breach at its subsidiary, Medlab Pathology, marking a first under Australia’s Privacy Act.
-

CISA Confirms Linux Kernel Flaw Exploited in Ransomware Attacks
CISA confirms active exploitation of CVE-2024-1086, a Linux kernel privilege escalation flaw, in ransomware attacks, urging federal agencies to patch immediately.
-

Google Explores Deeper Personal Data Integration for AI Search Mode
Google is reportedly developing capabilities for its AI Mode in Search to access personal user data from services such as Gmail and Google Drive, offering an opt-in for enhanced personalization.
-

Chinese State-Linked Group Exploits Windows Zero-Day Against European Diplomats
A China-linked threat actor, identified as UNC6384 (also known as Mustang Panda), is actively exploiting a Windows zero-day vulnerability, CVE-2025-9491, in targeted attacks against European diplomatic entities. The campaign aims to conduct cyber espionage, monitoring communications and exfiltrating sensitive data from compromised systems. This activity highlights the ongoing risk posed by unpatched vulnerabilities in critical…
-

Ukrainian National Extradited to U.S. on Conti Ransomware Charges
Ukrainian national Oleksii Oleksiyovych Lytvynenko has been extradited to the U.S. to face charges related to his alleged involvement with the Conti ransomware operation. This action highlights ongoing international efforts against cybercriminals, with Lytvynenko facing potential penalties for wire fraud and computer fraud conspiracy. The Conti group, active from 2020 to 2022, is linked to…
