https://kpopnewshub.com/giselles-renaissance-inside-aespas-global-muse-for-vogue-korea-x-loewe/?fsp_sid=16084
Kōtoku Shūsui in 1909
Context: Kōtoku Shūsui was a Japanese journalist and activist who started out as a socialist but shifted toward radical anarcho-syndicalism after reading Kropotkin while in prison.
He became the most prominent voice against the Meiji government, arguing that real change would only come through “direct action” by workers rather than through the ballot box. This made him the state’s biggest target, eventually leading to the High Treason Incident of 1910.
Even though there wasn’t any actual evidence that he was involved in a plot to assassinate the Emperor, the government used the trial to crush the anarchist movement entirely, and he was executed along with several others in 1911.
Yi Hoeyŏng in the 1920s
Context: Yi Hoeyŏng was a Korean independence activist who basically gave up everything to fight the Japanese occupation through anarchism. After fleeing into exile in China, he eventually moved away from mainstream nationalism and became a pioneer of the Korean anarchist movement. He was the driving force behind the Korean Anarchist Federation in China and pushed for a post-independence society based on local autonomous communities and self-management rather than a centralised government. Even in the face of constant danger, he stayed committed to the idea that true liberation required an anarchist framework, eventually dying in Japanese custody while trying to coordinate more militant resistance in Manchuria.
Sanctioned Solidarity
New Dohdoor malware campaign targets education and health care
A malicious campaign by threat actor UAT-10027 has been targeting education and healthcare sectors in the United States since December 2025. The campaign utilizes a new backdoor called Dohdoor, which employs DNS-over-HTTPS for stealthy command-and-control communications and can download and execute payloads reflectively. The multi-stage attack chain likely begins with phishing emails, followed by PowerShell scripts, batch files, and DLL sideloading techniques. Dohdoor uses various evasion methods, including API obfuscation, encrypted communications, and EDR bypasses. The campaign's infrastructure leverages Cloudflare services for stealth. While some techniques overlap with North Korean APT groups, the targeting differs from their typical focus.
Pulse ID: 69a1649bf2952cacd54d98fb
Pulse Link: https://otx.alienvault.com/pulse/69a1649bf2952cacd54d98fb
Pulse Author: AlienVault
Created: 2026-02-27 09:32:11
Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#BackDoor #Cloud #CyberSecurity #DNS #EDR #Education #Email #HTTP #HTTPS #Healthcare #InfoSec #Korea #Malware #NorthKorea #OTX #OpenThreatExchange #Phishing #PowerShell #SideLoading #UnitedStates #bot #AlienVault