Gajdek Graphics Blog
  • Blog Home Page
    • Logout
    • Log-In
  • Articles
    • IT Security
    • Graphics Design
  • Gajdek Graphics Home
  • Privacy Policy
Select Page
Cranking out spearphishing campaigns against Ukraine with an evolved toolset

Cranking out spearphishing campaigns against Ukraine with an evolved toolset

by Syndicated News Feed | Jul 2, 2025 | IT Security | 0 Comments

ESET Research analyzes Gamaredon’s updated cyberespionage toolset, new stealth-focused techniques, and aggressive spearphishing operations observed throughout 2024 02 Jul 2025  •  , 6 min. read Since Russia’s full-scale invasion of Ukraine in February 2022,...

read more
Qantas discloses cyberattack amid Scattered Spider aviation breaches

Qantas discloses cyberattack amid Scattered Spider aviation breaches

by Syndicated News Feed | Jul 1, 2025 | IT Security | 0 Comments

Australian airline Qantas disclosed that it detected a cyberattack on Monday after threat actors gained access to a third-party platform containing customer data. Qantas is Australia's largest airline, operating domestic and international flights across six...

read more
Microsoft open-sources VS Code Copilot Chat extension on GitHub

Microsoft open-sources VS Code Copilot Chat extension on GitHub

by Syndicated News Feed | Jul 1, 2025 | IT Security | 0 Comments

Microsoft has released the source code for the GitHub Copilot Chat extension for VS Code under the MIT license. This provides the community access to the full implementation of the chat-based coding assistant, including the implementation of “agent mode,” what...

read more
Microsoft admits to Intune forgetfulness • The Register

Microsoft admits to Intune forgetfulness • The Register

by Syndicated News Feed | Jul 1, 2025 | IT Security | 0 Comments

Microsoft Intune administrators may face a few days of stress after Redmond acknowledged a problem with security baseline customizations. The problem? Those customizations might not be saved during the update process, and the current workaround is to manually...

read more
ESET Threat Report H1 2025: Key findings

ESET Threat Report H1 2025: Key findings

by Syndicated News Feed | Jul 1, 2025 | IT Security | 0 Comments

ESET Chief Security Evangelist Tony Anscombe looks at some of the report's standout findings and their implications for organizations in 2025 01 Jul 2025 The ESET research team has released the H1 2025 issue of the ESET Threat Report, offering a detailed look...

read more
How cybercrooks get themselves caught • The Register

How cybercrooks get themselves caught • The Register

by Syndicated News Feed | Jul 1, 2025 | IT Security | 0 Comments

They say that success breeds complacency, and complacency leads to failure. For cybercriminals, taking too many shortcuts when it comes to opsec delivers a little more than that.  In these cases, failure might mean the criminal doesn't get access to the server...

read more
Malware sharing, data wiping and exploits

Malware sharing, data wiping and exploits

by Syndicated News Feed | Jul 1, 2025 | IT Security | 0 Comments

ESET experts discuss Sandworm’s new data wiper, relentless campaigns by UnsolicitedBooker, attribution challenges amid tool-sharing, and other key findings from the latest APT Activity Report 01 Jul 2025  •  , 2 min. read In the latest episode of the ESET...

read more
U.S. warns of Iranian cyber threats on critical infrastructure

U.S. warns of Iranian cyber threats on critical infrastructure

by Syndicated News Feed | Jun 30, 2025 | IT Security | 0 Comments

U.S. cyber agencies, the FBI, and NSA issued an urgent warning today about potential cyberattacks from Iranian-affiliated hackers targeting U.S. critical infrastructure. CISA says there are no indications of an ongoing campaign but urges critical infrastructure...

read more
US shuts down a string of North Korean IT worker scams • The Register

US shuts down a string of North Korean IT worker scams • The Register

by Syndicated News Feed | Jun 30, 2025 | IT Security | 0 Comments

The US Department of Justice has announced a major disruption of multiple North Korean fake IT worker scams. The feds say that they uncovered [PDF] the North Korean IT staff working at over 100 US companies using fictitious or stolen identities and not only...

read more
Seven months for IT worker who trashed his work network • The Register

Seven months for IT worker who trashed his work network • The Register

by Syndicated News Feed | Jun 30, 2025 | IT Security | 0 Comments

A judge has sentenced a disgruntled IT worker to more than seven months in prison after he wreaked havoc on his employer's network following his suspension, according to West Yorkshire Police. According to the police, Mohammed Umar Taj, 31, from the Yorkshire...

read more
« Older Entries
Next Entries »

Categories

  • Graphics Design (6)
  • IT Security (7,390)

Recent Posts

  • Developer jailed for malware that took out his employer • The Register 08/21/2025
  • Colt confirms customer data stolen as Warlock ransomware auctions files 08/21/2025
  • Orange Belgium’s 850K mega-breach raises fraud fears • The Register 08/21/2025
  • FBI warns of Russian hackers exploiting 7-year-old Cisco flaw 08/21/2025
  • China cut itself off from the global internet on Wednesday • The Register 08/20/2025
©2025 Gajdek Graphics
We employ cookies to guarantee an optimal experience on our website. For additional details, please refer to our privacy policy. By opting to utilize this site, you acknowledge and agree to our policy.