Cybercriminals Redefine Infrastructure: From IoT Hijacks to Malware Masquerades
Cybercriminals are now targeting what they once ignored: outdated software, unpatched IoT devices, and open-source packages. By redefining “infrastructure,” they’re quietly commandeering overlooked tech to reshape intrusion, persistence, and evasion at scale. It’s like finding treasure in forgotten gadgets—minus the pirate hat and parrot!

Hot Take:
What’s a cybercriminal’s favorite tool? Apparently, it’s anything you forgot to update! From neglected IoT devices to rusty end-of-life systems, threat actors are like raccoons rifling through your digital trash, turning yesterday’s tech into tomorrow’s chaos. Meanwhile, law enforcement is playing a global game of whack-a-mole, dismantling shady proxy networks like 5Socks, which is now about as useful as a screen door on a submarine! Who knew your grandma’s old smart fridge could be an accomplice in a botnet crime spree? Time to patch up, folks, or your next IoT device might just moonlight as a cybercriminal’s best friend.
Key Points:
- 5Socks Proxy network dismantled: Law enforcement takes down IoT-heavy criminal proxy network.
- COLDRIVER’s new malware spree: LOSTKEYS malware targets Western advisors and journalists.
- NSO Group’s big payout: Ordered to pay $168 million to WhatsApp for exploits.
- Malicious npm packages spotted: Targeting macOS Cursor users with dodgy API claims.
- SysAid patches critical flaws: Four vulnerabilities in IT support software addressed.