The Network · 2026-04-06 16:57:03 · TechCrunch
North Korean state-linked hackers executed a sophisticated, weeks-long campaign to compromise a widely used open source project by hijacking a top developer's computer. This was not a smash-and-grab operation but a patient, targeted intrusion designed to infiltrate the software supply chain at its source. By gaining co...
The Lab · 2026-04-24 09:54:07 · GitHub Issues
WhisperX's moderation queue has surfaced five high-severity intelligence items processed within a 14-hour window ending April 24, 2026, painting a picture of intensifying pressure across multiple threat vectors simultaneously.
The highest-signal item involves a FIRESTARTER backdoor that leveraged a Cisco vulnerability...
The Lab · 2026-05-05 11:01:45 · Schneier on Security
Google Threat Intelligence Group (GTIG) has identified a highly sophisticated iOS full-chain exploit, internally designated DarkSword, that leverages multiple zero-day vulnerabilities to achieve complete device compromise. The exploit chain, assessed with high confidence as government-designed based on toolmarks in rec...
The Network · 2026-05-11 02:01:48 · Schneier on Security
Security researchers have successfully reverse-engineered Fast16, a highly sophisticated piece of malware that analysis suggests was developed and deployed by a nation-state actor—most likely the United States—against Iranian targets years before the infamous Stuxnet worm. The technical details, now emerging through in...