![]() |
Description: The loosely affiliated hacking group has shifted closer to ransomware gangs, raising questions about Scattered Spider's ties to the Russian cybercrime underground.
May 27th, 2025 (17 days ago)
|
![]() |
Description: The mission is to gather information that could help Russia in its war against Ukraine.
May 27th, 2025 (17 days ago)
|
![]() |
Description: While Ukraine remains Russia's major target for cyberattacks, TAG-110 is part of a strategy to preserve "a post-Soviet sphere of influence" by embedding itself in other countries' infrastructures.
May 27th, 2025 (17 days ago)
|
![]() |
Description: A multiyear investigation by a public-private partnership has resulted in the seizure of the botnet's US-based infrastructure and indictments for its key players, significantly disrupting a vast cybercriminal enterprise.
May 27th, 2025 (17 days ago)
|
![]() |
Description: A Russian court sentenced a former hospital programmer to 14 years in a high-security penal colony for allegedly leaking personal data of Russian soldiers to Ukraine, authorities said.
May 27th, 2025 (17 days ago)
|
![]() |
May 27th, 2025 (17 days ago)
|
![]() |
Description: Recent attacks on institutions in the Netherlands were the work of a previously unknown Russian hacking group that Dutch intelligence agencies are labeling Laundry Bear. Microsoft also reported on the group, naming it Void Blizzard.
May 27th, 2025 (17 days ago)
|
![]() |
Description: Microsoft has shed light on a previously undocumented cluster of threat activity originating from a Russia-affiliated threat actor dubbed Void Blizzard (aka Laundry Bear) that it said is attributed to "worldwide cloud abuse."
Active since at least April 2024, the hacking group is linked to espionage operations mainly targeting organizations that are important to Russian government objectives,
May 27th, 2025 (17 days ago)
|
![]() |
Description: A previously unknown Russian-backed cyberespionage group now tracked as Void Blizzard has been linked to a September 2024 Dutch police security breach. [...]
May 27th, 2025 (18 days ago)
|
![]() |
Description: The Russia-aligned threat actor known as TAG-110 has been observed conducting a spear-phishing campaign targeting Tajikistan using macro-enabled Word templates as an initial payload.
The attack chain is a departure from the threat actor's previously documented use of an HTML Application (.HTA) loader dubbed HATVIBE, Recorded Future's Insikt Group said in an analysis.
"Given TAG-110's historical
May 27th, 2025 (18 days ago)
|