North Korea’s Kimsuky Taps Trusted Platforms to Attack South Korea Posted on February 19, 2025 The campaign heavily uses Dropbox folders and PowerShell scripts to evade detection and quickly scrapped infrastructure components after researchers began poking around.
Sensitive Dutch Medical Records Bought in Bulk at Flea Market in the Netherlands News A bargain hunter from the Netherlands stumbled upon a trove… rooter February 20, 2025 1 min read 0
Mamoru Hosoda’s New Movie Looks Like a Fantastical Revenge Epic News 'Scarlet', made in collaboration with Sony Pictures and Studio Chizu,… rooter August 1, 2025 1 min read 0
Chrome Store Features Extension Poisoned With Sophisticated Spyware News A color picker for Google's browser with more than 100,000… rooter July 7, 2025 1 min read 0
CDK Attack: Why Contingency Planning Is Critical for SaaS Customers News Daily operations at some 15,000 automotive dealers remain impacted as… rooter June 24, 2024 1 min read 0