Dutch halt state intervention at Chinese-owned chipmaker Nexperia, paving way for exports to resume

This photograph shows a general view of Nexperia headquarters in Nijmegen on November 6, 2025. John Thys | Afp | Getty Images The Dutch government on Wednesday said it suspended its intervention at Chinese-owned chipmaker Nexperia, following constructive talks with Chinese authorities. “We see this as a show of goodwill,” Dutch Economy Minister Vincent Karremans […]

Continue Reading

Apple’s New N1 Wireless Chip Reportedly Rivals Android Flagships in Real-World Wi-Fi Speeds

Apple’s new N1 wireless networking chip, introduced with the iPhone 17 series and iPhone Air, delivers a major real-world performance boost over the previous generation and competes closely with Android flagships. Crowdsourced Ookla data shows higher speeds, stronger consistency in weak Wi-Fi conditions and improved reliability, despite the N1 lacking full 320MHz Wi…

Continue Reading

Sneaky 2FA Phishing Kit Adds BitB Pop-ups Designed to Mimic the Browser Address Bar

The malware authors associated with a Phishing-as-a-Service (PhaaS) kit known as Sneaky 2FA have incorporated Browser-in-the-Browser (BitB) functionality into their arsenal, underscoring the continued evolution of such offerings and further making it easier for less-skilled threat actors to mount attacks at scale. Push Security, in a report shared with The Hacker News, said it observed […]

Continue Reading

Researchers Detail Tuoni C2’s Role in an Attempted 2025 Real-Estate Cyber Intrusion

Nov 18, 2025Ravie LakshmananMalware / Social Engineering Cybersecurity researchers have disclosed details of a cyber attack targeting a major U.S.-based real-estate company that involved the use of a nascent command-and-control (C2) and red teaming framework known as Tuoni. “The campaign leveraged the emerging Tuoni C2 framework, a relatively new, command-and-control (C2) tool (with a free […]

Continue Reading

Iranian Hackers Use DEEPROOT and TWOSTROKE Malware in Aerospace and Defense Attacks

Nov 18, 2025Ravie LakshmananCyber Espionage / Malware Suspected espionage-driven threat actors from Iran have been observed deploying backdoors like TWOSTROKE and DEEPROOT as part of continued attacks aimed at aerospace, aviation, and defense industries in the Middle East. The activity has been attributed by Google-owned Mandiant to a threat cluster tracked as UNC1549 (aka Nimbus […]

Continue Reading