Aggregator
North Korean Hackers Weaponize Seoul Intelligence Files to Target South Koreans
New TAOTH Campaign Exploits End-of-Support Software to Distribute Malware and Collect Sensitive Data
In June 2025, a previously undocumented campaign leveraging end-of-support software began surfacing in telemetry data gathered across Eastern Asia. Dubbed TAOTH, the operation exploits an abandoned Chinese input method editor (IME), Sogou Zhuyin, to deliver multiple malware families. Initial intelligence indicated that victims, primarily traditional Chinese users and dissidents, downloaded what appeared to be legitimate […]
The post New TAOTH Campaign Exploits End-of-Support Software to Distribute Malware and Collect Sensitive Data appeared first on Cyber Security News.
Microsoft says recent Windows update didn't kill your SSD
Microsoft Edge security advisory (AV25-551)
CVE-2025-48384
CVE-2025-37899
CVE-2025-31200
Tonic.ai product updates: August 2025
Introducing the Data Vending Machine, schema caching in Structural, strengthened synthesis in Textual, + Object and Array generators in Fabricate!
The post Tonic.ai product updates: August 2025 appeared first on Security Boulevard.
Weaponized PDFs and LNK Files Used in Windows Attacks
A clandestine campaign in which threat actors are weaponizing a legitimate-looking PDF document, titled “국가정보연구회 소식지 (52호)” (National Intelligence Research Society Newsletter – Issue 52), alongside a malicious Windows shortcut (LNK) file named 국가정보연구회 소식지(52호).pdf.LNK. The attackers distribute both files together—either within the same archive or as seemingly related attachments. When victims open the LNK […]
The post Weaponized PDFs and LNK Files Used in Windows Attacks appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.