Author: user
November 18, 2025Ravi LakshmananMalware/Social Engineering Cybersecurity researchers have revealed details of a cyberattack that targeted a major US-based real estate company. This attack included the use of an early command and control (C2) and red team framework known as Tuoni. “This campaign leveraged the emerging Tuoni C2 framework, a relatively new command-and-control (C2) tool (with a free license) that stealthly delivers in-memory payloads,” Morphisec researcher Shmuel Yuzan said in a report shared with Hacker News. Tuoni is touted as an advanced C2 framework designed for security professionals, facilitating penetration testing operations, red team engagement, and security assessments. The “community edition”…
According to a report from Tubefilter, the number of sponsored video views on YouTube increased by 28% year-over-year in the first half of 2025, and the number of sponsored videos increased by 54% year-over-year. Additionally, ad spend through creator channels is steadily increasing and in some cases even outperforming traditional media. Buoyed by these signals, Agentio, a startup that connects brands and YouTube creators with sponsored videos, has raised $40 million, its third funding round in recent years. The Series B round is led by consumer-focused VC Forerunner with participation from existing investors Benchmark, Craft Ventures, AlleyCorp, Antler, and Starting…
According to a report from Tubefilter, the number of sponsored video views on YouTube increased by 28% year-over-year in the first half of 2025, and the number of sponsored videos increased by 54% year-over-year. Additionally, ad spend through creator channels is steadily increasing and in some cases even outperforming traditional media. Buoyed by these signals, Agentio, a startup that connects brands and YouTube creators with sponsored videos, has raised $40 million, its third funding round in recent years. The Series B round is led by consumer-focused VC Forerunner with participation from existing investors Benchmark, Craft Ventures, AlleyCorp, Antler, and Starting…
November 18, 2025Ravi LakshmananCyber espionage/malware Suspected Iranian espionage actors have been observed deploying backdoors such as TWOSTROKE and DEEPROOT as part of an ongoing campaign targeting aerospace, aviation, and defense industries in the Middle East. The activity is believed to be due to a threat cluster tracked by Google-owned Mandiant as UNC1549 (also known as Nimbus Manticore or Subtle Snail), and was first documented by the threat intelligence firm early last year. Researchers Mohamed El Banna, Daniel Lee, Mike Stockel, and Josh Goddard said, “UNC1549, which was active from late 2023 to 2025, employed sophisticated initial access vectors, including exploiting…
Mirela Athanasiou, Head of Operations and Communications at the Clean Hydrogen Partnership, talks about Hydrogen Valley and how it is accelerating Europe’s clean hydrogen economy. Europe’s clean hydrogen transition has reached a decisive turning point, with the focus shifting to large-scale deployment. The most visible example of this change is the rise of hydrogen valleys, regional ecosystems where hydrogen is produced, stored, distributed and used across multiple sectors. Europe’s energy revolution is currently happening in regions, cities and industrial clusters, building clean hydrogen economies from the ground up to drive decarbonization and regional growth. From concept to reality Born out…
Dr. Farshad Badi, Head of Computer Science and Informatics at the Berlin School of Business and Innovation, explores how AI and robotics can incorporate human-centered values to complement our experiences. Thinking about the rapid advances in artificial intelligence (AI) and robotics makes us both excited and cautious. In my opinion, these technologies (and indeed systems) have great potential to reshape every industry and improve our daily lives. But such promises also come with challenges. How can we ensure that these systems serve us in truly meaningful ways? How can we design robots that not only perform tasks, but also respect…
Identity security fabric (ISF) is a unified architectural framework that brings together disparate identity capabilities. Through ISF, identity governance and administration (IGA), access management (AM), privileged access management (PAM), and identity threat detection and response (ITDR) are all integrated into a single, cohesive control plane. Building on Gartner’s definition of “identity fabric,” identity security fabric takes a more proactive approach, securing all identity types (human, machine, and AI agents) across on-prem, hybrid, multi-cloud, and complex IT environments. Why identity security fabric matters now As cyberattacks become more prevalent and sophisticated, traditional approaches characterized by siloed identity tools can’t keep pace…
New government funding will help make some of the UK’s boldest ideas in life sciences a reality, from putting robots in factories to make medicines to turning spent nuclear fuel into next-generation cancer treatments. All of these innovative technologies are set to get a boost thanks to more than £74 million of government and industry support for UK life sciences innovators. The Government is currently funding eight innovative research and development projects with more than £54 million through the Sustainable Medicines Manufacturing Innovation Programme. The program is a joint government and industry initiative, funded through the VPAG investment program and…
The latest findings, published in the new Veterinary Antimicrobial Resistance and Marketing Surveillance (VARRS) report, highlight the country’s continued leadership across Europe in responsible antibiotic management in agriculture. Commenting on this achievement, Baroness Heyman, Minister for Biosecurity, Borders and Animal Welfare, said: “We remain committed to leading the global fight against antimicrobial resistance and maintaining our position as one of the countries with the lowest use of veterinary antibiotics across Europe, so that future generations can benefit.” Significant reductions will strengthen public health and food security The continued decline in the use of veterinary antibiotics is being hailed as a…
November 18, 2025Ravi LakshmananMalware/Web Security Cybersecurity researchers discovered a set of seven npm packages published by a single attacker. The package leverages a cloaking service called Adspect to distinguish between real victims and security researchers, ultimately redirecting them to a sketchy crypto-themed site. Below are malicious npm packages published by a threat actor named ‘dino_reborn’ between September and November 2025. As of this writing, npm accounts do not exist on npm. signal-embed (342 downloads) dsidospsodlks (184 downloads) applicationooks21 (340 downloads) application-phskck (199 downloads) integrator-filescrypt2025 (199 downloads) integrator-2829 (276 downloads) integrator-2830 (290 downloads) “When you visit a fake website built by…