Cybersecurity News
Understand the Threats. Protect What Matters.
- Joint Statement from CISA, FBI, DC3 and NSA on Potential Targeted Cyber Activity Against U.S. Critical Infrastructure by Iranby CISA on June 30, 2025 at 12:00 pm
- ICE Rolls Facial Recognition Tools Out to Officers’ Phonesby Lily Hay Newman, Andy Greenberg, Dell Cameron on June 28, 2025 at 10:30 am
Plus: US feds charge alleged masterminds behind infamous forum, Scattered Spider targets airlines, and hackers open a valve at a Norwegian dam.
- US Supreme Court Upholds Texas Porn ID Lawby Matt Burgess on June 27, 2025 at 3:36 pm
In a 6-3 decision, the Supreme Court held that age verification for explicit sites is constitutional. In a dissent, Justice Elena Kagan warned it burdens adults and ignores First Amendment precedent.
- ‘They’re Not Breathing’: Inside the Chaos of ICE Detention Center 911 Callsby Dhruv Mehrotra, Dell Cameron on June 25, 2025 at 9:21 pm
Records of hundreds of emergency calls from ICE detention centers obtained by WIRED—including audio recordings—show a system inundated by life-threatening incidents, delayed treatment, and overcrowding.
- Telegram Purged Chinese Crypto Scam Markets—Then Watched as They Rebuiltby Andy Greenberg on June 23, 2025 at 4:48 pm
Last month, Telegram banned black markets that sold tens of billions of dollars in crypto scam-related services. Now, as those markets rebrand and bounce back, it’s done nothing to stop them.
The Hacker News Most trusted, widely-read independent cybersecurity news source for everyone; supported by hackers and IT professionals — Send TIPs to [email protected]
- U.S. Agencies Warn of Rising Iranian Cyberattacks on Defense, OT Networks, and Critical Infrastructureby [email protected] (The Hacker News) on June 30, 2025 at 4:29 pm
U.S. cybersecurity and intelligence agencies have issued a joint advisory warning of potential cyber-attacks from Iranian state-sponsored or affiliated threat actors. “Over the past several months, there has been increasing activity from hacktivists and Iranian government-affiliated actors, which is expected to escalate due to recent events,” the agencies said. “These cyber actors often
- Europol Dismantles $540 Million Cryptocurrency Fraud Network, Arrests Five Suspectsby [email protected] (The Hacker News) on June 30, 2025 at 3:17 pm
Europol on Monday announced the takedown of a cryptocurrency investment fraud ring that laundered €460 million ($540 million) from more than 5,000 victims across the world. The operation, the agency said, was carried out by the Spanish Guardia Civil, along with support from law enforcement authorities from Estonia, France, and the United States. Europol said the investigation into the syndicate
- Blind Eagle Uses Proton66 Hosting for Phishing, RAT Deployment on Colombian Banksby [email protected] (The Hacker News) on June 30, 2025 at 1:30 pm
The threat actor known as Blind Eagle has been attributed with high confidence to the use of the Russian bulletproof hosting service Proton66. Trustwave SpiderLabs, in a report published last week, said it was able to make this connection by pivoting from Proton66-linked digital assets, leading to the discovery of an active threat cluster that leverages Visual Basic Script (VBS) files as its
- Leveraging Credentials As Unique Identifiers: A Pragmatic Approach To NHI Inventories by [email protected] (The Hacker News) on June 30, 2025 at 11:00 am
Identity-based attacks are on the rise. Attacks in which malicious actors assume the identity of an entity to easily gain access to resources and sensitive data have been increasing in number and frequency over the last few years. Some recent reports estimate that 83% of attacks involve compromised secrets. According to reports such as the Verizon DBIR, attackers are more commonly using stolen
- ⚡ Weekly Recap: Airline Hacks, Citrix 0-Day, Outlook Malware, Banking Trojans and moreby [email protected] (The Hacker News) on June 30, 2025 at 10:16 am
Ever wonder what happens when attackers don’t break the rules—they just follow them better than we do? When systems work exactly as they’re built to, but that “by design” behavior quietly opens the door to risk? This week brings stories that make you stop and rethink what’s truly under control. It’s not always about a broken firewall or missed patch—it’s about the small choices, default settings