In the first timeline of March 2025, I collected 127 events with a threat landscape dominated by malware and ransomware...| HACKMAGEDDON
AI is driving a rapid increase in sophisticated cyberattacks, and Australia’s high median wealth, abundant resources, and geopolitical influence make it a prime target for both cybercrime groups and advanced persistent threats (APTs). Cyble has documented more than 50 threat groups active in Australia in 2025, including ransomware and cybercrime groups, hacktivists, and APTs linked to China, Russia, Iran, and North Korea. Cyble dark web researchers have investigated 71 major cyber incid...| Cyble Podcast | Cybersecurity & Threat Intelligence Insights
After the cyber attacks timelines, it’s time to publish the statistics for February 2025 where I collected and analyzed 231 events. In February 2025, Cyber Crime continued to lead the Motivations chart with 64% down from 75%, of February. Operations driven by Cyber Espionage ranked at number two with 20%, an important increase from 12% and once again ahead of Hacktivism slightly down to 3% from 4%. Only a single event was attributed to Cyber Warfare that closes the chart.| HACKMAGEDDON
In the second timeline of February 2025, I collected 116 events (8.92 events/day) with a threat landscape dominated by malware with 29%, a value very close to 30% of the previous timeline, ahead of ransomware, back at number two with 21%, from 8% of the previous fortnight, and targeted attacks with 17%, very close to 16% of H1.| HACKMAGEDDON
After the cyber attacks timelines, it’s time to publish the statistics for January 2025 where I collected and analyzed 216 events.In January 2025, Cyber Crime continued to lead the Motivations chart.| HACKMAGEDDON
In the second timeline of January 2025, I collected 107 events with a threat landscape dominated by malware with 30%, up from 18% of the previous timeline, and very close to the values of December 2024, ahead of ransomware with 19%.| HACKMAGEDDON
In the first timeline of January 2025, I collected 109 events with a threat landscape dominated by malware with 18%, down from 33% of the previous timeline, and once again ahead of account takeovers with 17% (it was 20% in the previous timeline), and ransomware with 14%.| HACKMAGEDDON
I aggregated the statistics created from the cyber attacks timelines published in Q4 2024. In this period, I collected a total of 694 events dominated by Cyber Crime with 70%, slightly up from 65.5% of Q3.| HACKMAGEDDON
In early 2015, the United States Federal Bureau of Investigation (FBI) made a bold move. It placed self-proclaimed hacktivist, Jeremy Hammond, already in| Hackread - Latest Cybersecurity, Tech, Crypto & Hacking News
By FRANK BAJAK| FRANK BAJAK
Follow us on Twitter (X) @Hackread - Facebook @ /Hackread| Hackread - Latest Cybersecurity, Tech, Crypto & Hacking News
On Ukrainian Independence Day the IT Army of Ukraine announce a number of new victories, release a Youtube about their outage of Russian postal services, and promote a major leak of financial data from brand new hacktivist crew 2402.| The Cryptosphere
They’re on a roll, with three updates in 36 hours. Today they’re continuing to hit the Russian drone industry, and adding new targets suggested by hacktivist supporters around the world. Shall we get into it? Let’s get into it. Announcements... Read More ›| The Cryptosphere
The IT Army of Ukraine continues to target drone companies in Russia.| The Cryptosphere
Today, the IT Army of Ukraine and its hacktivist supporters target Russian drone companies.| The Cryptosphere
Sorry we’ve been offline: Ottawa has had a massive internet outage that’s still not fully resolved (we’d like to think that’s Russia trying to stop us from posting these, but we’d like the liability courts NOT to think that). And... Read More ›| The Cryptosphere
Today the IT Army of Ukraine targets supply and logistics in Russia.| The Cryptosphere
Learn about NoName057(16), a pro-Russian hacktivist group behind Project DDoSia targeting entities supporting Ukraine. Discover an overview of the changes made by the group, both from the perspective of the software shared by the group to generate DDoS attacks and the specifics of the evolution of the C2 servers. It also provides an overview of the country and sectors targeted by the group for 2024.| Sekoia.io Blog