sctocs

Ukrainian National Sentenced to 5 Years in North Korea IT Worker Fraud Scheme

A 29 year old Ukrainian citizen has been sentenced to five years in a U.S. federal prison for helping facilitate North Korea’s fraudulent IT worker operation that infiltrated dozens of American companies. Oleksandr “Alexander” Didenko pleaded guilty in November 2025 to wire fraud conspiracy and aggravated identity theft. Authorities say he stole the identities of […]

Ukrainian National Sentenced to 5 Years in North Korea IT Worker Fraud Scheme Read More »

FBI Reports 1,900 ATM Jackpotting Incidents Since 2020, $20M Lost in 2025

The Federal Bureau of Investigation (FBI) has issued a fresh warning about the surge in ATM jackpotting attacks across the United States, revealing that financial losses exceeded $20 million in 2025 alone. According to federal data, approximately 1,900 jackpotting incidents have been reported since 2020, with 700 of those occurring in 2024. In December 2025, the U.S. Department

FBI Reports 1,900 ATM Jackpotting Incidents Since 2020, $20M Lost in 2025 Read More »

Former Google Engineers Indicted for Transferring Trade Secrets to Iran

Two former engineers from Google and the husband of one of them have been indicted in the United States for allegedly stealing sensitive trade secrets from major technology firms and transferring the information to unauthorized destinations, including Iran. The defendants, Samaneh Ghandali, 41, her husband Mohammadjavad Khosravi, also known as Mohammad Khosravi, 40, and her sister Soroor

Former Google Engineers Indicted for Transferring Trade Secrets to Iran Read More »

PromptSpy Android Malware Exploits Gemini AI to Automate Recent-Apps Persistence

Cybersecurity researchers have uncovered a sophisticated Android malware, named PromptSpy, that leverages Google’s generative AI chatbot Gemini to automate actions and ensure persistence on infected devices. This marks one of the first known cases of malware incorporating generative AI into its operational flow. How PromptSpy Operates PromptSpy is capable of: According to Lukáš Štefanko, Gemini is

PromptSpy Android Malware Exploits Gemini AI to Automate Recent-Apps Persistence Read More »

INTERPOL Operation Red Card 2.0 Leads to 651 Arrests in African Cybercrime Crackdown

An international cybercrime operation targeting online scams has resulted in 651 arrests and the recovery of over $4.3 million, coordinated by law enforcement agencies from 16 African countries. The initiative, named Operation Red Card 2.0, ran from December 8, 2025 to January 30, 2026, focusing on high-yield investment scams, mobile money fraud, and fraudulent mobile

INTERPOL Operation Red Card 2.0 Leads to 651 Arrests in African Cybercrime Crackdown Read More »

Microsoft Fixes CVE-2026-26119 Privilege Escalation Flaw in Windows Admin Center

Microsoft has addressed a high-severity security vulnerability in Windows Admin Center that could allow attackers to escalate privileges on affected systems. The flaw, tracked as CVE-2026-26119, carried a CVSS score of 8.8 out of 10, highlighting its potential risk to enterprise environments. About the Vulnerability Windows Admin Center is a locally deployed, browser-based management suite enabling administrators

Microsoft Fixes CVE-2026-26119 Privilege Escalation Flaw in Windows Admin Center Read More »

Fake IPTV Apps Distribute Massiv Android Malware Targeting Mobile Banking Users

Cybersecurity experts have identified a new Android banking trojan called Massiv, designed to conduct device takeover (DTO) attacks for financial theft. The malware hides inside seemingly legitimate IPTV apps, luring users who are searching for online TV services and giving attackers remote control over infected devices. How Massiv Operates According to ThreatFabric, Massiv first appeared in

Fake IPTV Apps Distribute Massiv Android Malware Targeting Mobile Banking Users Read More »

CRESCENTHARVEST Campaign Targets Iran Protest Supporters with RAT Malware

Cybersecurity researchers have uncovered a new cyber espionage campaign, dubbed CRESCENTHARVEST, that appears to target individuals supporting ongoing protests in Iran. The operation is designed to deploy a remote access trojan, RAT, capable of long term surveillance, credential theft, and sensitive data exfiltration. Security analysts warn that the campaign reflects a broader pattern of nation

CRESCENTHARVEST Campaign Targets Iran Protest Supporters with RAT Malware Read More »

Grandstream GXP1600 VoIP Phones Vulnerable to Unauthenticated Remote Code Execution

A serious cybersecurity vulnerability has been identified in the Grandstream GXP1600 series VoIP phones, potentially allowing attackers to take full control of affected devices without authentication. Security experts warn that this flaw could enable remote compromise with root-level privileges, placing enterprise voice networks at significant risk. Critical RCE Vulnerability Identified The vulnerability, tracked as CVE-2026-2329, carries a CVSS

Grandstream GXP1600 VoIP Phones Vulnerable to Unauthenticated Remote Code Execution Read More »

Critical Vulnerabilities Discovered in Four VS Code Extensions with Over 125 Million Installs

Cybersecurity researchers have uncovered serious security vulnerabilities in four widely used Microsoft Visual Studio Code extensions. These flaws could allow attackers to steal sensitive local files and remotely execute malicious code on developers’ machines. The affected extensions, installed more than 125 million times collectively, include Live Server, Code Runner, Markdown Preview Enhanced, and Microsoft Live

Critical Vulnerabilities Discovered in Four VS Code Extensions with Over 125 Million Installs Read More »