exclusive
content

Referred to as a “dirty” internet line, it connects directly to the public internet, where the user’s information and websites accessed don’t have the same security filters as the Pentagon’s.

Defense Secretary Pete Hegseth had an internet connection that bypassed the Pentagon’s security protocols set up in his office to use the Signal messaging app on a personal computer, two people familiar with the line told The Associated Press.

The existence of the unsecured internet connection is the latest revelation about Hegseth’s use of the unclassified app and raises the possibility that sensitive defense information could have been put at risk of potential hacking or surveillance.

Stay updated with SOC News for cutting-edge security innovations and expert industry insights! 

Source : https://www.ktvq.com/us-news/hegseth-had-an-unsecured-internet-line-set-up-in-his-office-to-connect-to-signal-ap-sources-say

The threat actors behind the Darcula phishing-as-a-service (PhaaS) platform have released new updates to their cybercrime suite with generative artificial intelligence (GenAI) capabilities.

“This addition lowers the technical barrier for creating phishing pages, enabling less tech-savvy criminals to deploy customized scams in minutes,” Netcraft said in a new report shared with The Hacker News.

“The new AI-assisted features amplify Darcula’s threat potential by simplifying the process to build tailored phishing pages with multi-language support and form generation — all without any programming knowledge.”

Darcula was first documented by the cybersecurity company in March 2024 as a toolkit that leveraged Apple iMessage and RCS to send smishing messages to users that trick recipients into clicking on bogus links under the guise of postal services like USPS.

Stay updated with SOC News for cutting-edge security innovations and expert industry insights! 

Source : https://thehackernews.com/2025/04/darcula-adds-genai-to-phishing-toolkit.html