"Public meetings are not press conferences!" CM Pinarayi Vijayan doubles down on his "Go ask that at home" comment, stating that 'natural reactions' follow when public decorum is ignored. Addressing the Konni incident from Idukki, the CM dismissed criticisms regarding his composure and reminded the audience that those uninterested in the speech are free to leave. https://english.mathrubhumi.com/news/kerala/go-ask-that-at-home-a-natural-reaction-public-meetings-have-decorum-kerala-cm-pinarayi-vijayan-watch-hi4cs1jf?utm_source=dlvr.it&utm_medium=mastodon #PinarayiVijayan #KeralaPolitics #LDF2026 #Konni #KeralaElections

#CheckPoint Research identified an ongoing #phishing campaign associated with #KONNI, a North Korean–linked threat actor active since at least 2014. The campaign targets software developers and engineering teams across the Asia-Pacific region, including Japan, Australia, and India, using blockchain-themed lures to prompt interaction and deliver malicious content. In observed activity, the threat actor deploys AI-generated #PowerShell #backdoors.

https://research.checkpoint.com/2026/konni-targets-developers-with-ai-malware/

KONNI Adopts AI to Generate PowerShell Backdoors - Check Point Research

North Korea-linked threat group KONNI targets countries across APAC, specifically in blockchain sectors, with AI-generated malware

Check Point Research
Konni hackers target blockchain engineers with AI-built malware

The North Korean hacker group Konni (Opal Sleet, TA406) is using AI-generated PowerShell malware to target developers and engineers in the blockchain sector.

BleepingComputer
North Korea–linked KONNI uses AI to build stealthy malware tooling

Check Point links an active phishing campaign to North Korea–aligned KONNI, using an AI-written PowerShell backdoor.

Security Affairs
KONNI Adopts AI to Generate PowerShell Backdoors - Check Point Research

North Korea-linked threat group KONNI targets countries across APAC, specifically in blockchain sectors, with AI-generated malware

Check Point Research

📰 North Korean 'Konni' APT Weaponizes Google Ads to Deliver EndRAT Malware

North Korean APT 'Konni' is weaponizing Google Ads URLs in 'Operation Poseidon' to bypass security and deliver the EndRAT malware. The attack uses clever evasion techniques to beat AI filters. ⚠️ #Konni #APT #Malware #EndRAT #ThreatIntel

🔗 https://cyber.netsecops.io/articles/north-korean-apt-konni-abuses-google-ads-in-operation-poseidon/?utm_source=mastodon&utm_medium=social&utm_campaign=twitter_auto

North Korean 'Konni' APT Weaponizes Google Ads to Deliver EndRAT Malware

The North Korean APT group Konni is abusing Google's advertising platform in a campaign dubbed "Operation Poseidon" to deliver the EndRAT malware, using sophisticated evasion techniques.

CyberNetSec.io

🪝 North Korea-linked #KONNI hackers used KakaoTalk and Google Find Hub to spy on victims and remotely wipe #Android devices in a targeted phishing campaign.

Read: https://hackread.com/hackers-kakaotalk-google-find-hub-android-spyware/

#CyberSecurity #NorthKorea #SouthKorea #Spyware #KakaoTalk

Hackers Use KakaoTalk and Google Find Hub in Android Spyware Attack

Follow us on Bluesky, Twitter (X), Mastodon and Facebook at @Hackread

State-Sponsored Remote Wipe Tactics Targeting Android Devices
#Konni
https://www.genians.co.kr/en/blog/threat_intelligence/android
State-Sponsored Remote Wipe Tactics Targeting Android Devices

The Konni APT campaign has caused damage by remotely resetting Google Android-based devices, resulting in the unauthorized deletion of personal data.

North Korea-linked Konni APT used Google Find Hub to erase data and spy on defectors

North Korea-linked APT Konni posed as counselors to steal data and wipe Android phones via Google Find Hub in Sept 2025.

Security Affairs

North Korean hackers are using Google’s own tools to remotely wipe Android devices and hijack messaging apps. Think your account is safe? Dive into how a single breach can trigger a digital meltdown.

https://thedefendopsdiaries.com/konni-activity-cluster-north-korean-apts-exploit-google-find-hub-for-advanced-cyber-espionage/

#konni
#apt37
#cyberespionage
#androidsecurity
#googlefindhub
#malware
#northkorea
#spearphishing
#infosec

KONNI Activity Cluster: North Korean APTs Exploit Google Find Hub for Advanced Cyber-Espionage

North Korean APTs exploit Google Find Hub to wipe Android devices, hijack accounts, and evade detection with advanced KONNI malware and social engineering.

The DefendOps Diaries