Researchers Uncover Service Providers Fueling Industrial-Scale Pig Butchering Fraud

Cybersecurity researchers have shed light on two service providers that supply online criminal networks with the necessary tools and infrastructure to fuel the pig butchering-as-a-service (PBaaS) economy. At least since 2016, Chinese-speaking criminal groups have erected industrial-scale scam centers across Southeast Asia, creating special economic zones that are devoted to fraudulent investment and impersonation operations. […]

Continue Reading

Amazon Great Republic Day Sale 2026: Discounts on OnePlus 15, Samsung Galaxy A55 and More Smartphones Revealed

Amazon Great Republic Day Sale 2026 is set to kick off in India on January 16. The sale event comes as part company’s celebrations of India’s 77th Republic Day, which will take place on January 26. During the upcoming sale, the e-commerce platform will offer smartphones, tablets, laptops, TVs, cameras, Bluetooth speakers, true wireless stereos […]

Continue Reading

Malaysia and Indonesia block Elon Musk’s Grok due to nonconsensual sexual content

Nurphoto | Nurphoto | Getty Images Malaysia and Indonesia blocked access to Elon Musk’s artificial intelligence chatbot Grok over the weekend due to concerns that the tool was being used to generate nonconsensual, sexually explicit content.  Malaysian regulators ordered temporary restrictions be placed on the chatbot from xAI on Sunday following “repeated failures by X […]

Continue Reading

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

Jan 10, 2026Ravie LakshmananCyber Espionage / Malware The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting diplomatic, maritime, financial, and telecom entities in the Middle East with a Rust-based implant codenamed RustyWater. “The campaign uses icon spoofing and malicious Word documents to deliver Rust based implants capable of asynchronous […]

Continue Reading

China-Linked Hackers Exploit VMware ESXi Zero-Days to Escape Virtual Machines

Jan 09, 2026Ravie LakshmananVirtualization / Vulnerability Chinese-speaking threat actors are suspected to have leveraged a compromised SonicWall VPN appliance as an initial access vector to deploy a VMware ESXi exploit that may have been developed as far back as February 2024. Cybersecurity firm Huntress, which observed the activity in December 2025 and stopped it before […]

Continue Reading