160 scanned. Nothing on fire. Read at your own pace.
Researchers are warning that the VECT 2.0 ransomware has a problem in the way it handles encryption nonces that leads to permanently destroying larger files rather than encrypt them.
A 19-year-old dual United States and Estonian citizen arrested in Finland earlier this month faces federal charges in the U.S. alleging he was a prolific member of the notorious Scattered Spider hacking collective.
Zscaler ThreatLabz 2026 VPN Risk Report with Cybersecurity Insiders. AI collapsed human response window and turned remote access into fastest path to breach.
When cybercrime operations are disrupted, the cause is typically not due to sophisticated detection, but rather basic operational mistakes such as identity reuse, weak infrastructure separation, or overlooked metadata.
The ShinyHunters cybercrime group claimed to have stolen 9 million records containing personal information from Medtronic.
The tech giant found that many indirect prompt injection attempts are harmless, but some malicious exploits have also been identified.
Itron, which serves utilities and cities around the world, discovered unauthorized access to its systems on April 13.
The vulnerability is tracked as CVE-2026-6770 and it has been patched with the release of Firefox 150 and Tor 15.0.10.
Utility technology company Itron, Inc. has disclosed that an unauthorized third party accessed some of its internal systems during a cyberattack.
A threat group tracked as UNC6692 uses social engineering to deploy a new, custom malware suite named “Snow,” which includes a browser extension, a tunneler, and a backdoor.
A new financially motivated hacking group tracked as BlackFile has been linked to a wave of data theft and extortion attacks against retail and hospitality organizations since February 2026.
Recently observed Trigona ransomware attacks are using a custom, command-line tool to steal data from compromised environments faster and more efficiently.
A new Mirai-based malware campaign is actively exploiting CVE-2025-29635, a high-severity command-injection vulnerability affecting D-Link DIR-823X routers, to enlist devices into the botnet.
A new Kyber ransomware operation is targeting Windows systems and VMware ESXi endpoints in recent attacks, with one variant implementing Kyber1024 post-quantum encryption.
The Spanish police have dismantled what they claim is the largest Spanish-language manga piracy platform, operating since 2014 and serving millions of monthly users worldwide.
Fraudulent phone calls have become a daily reality for millions of people worldwide.
A Linux variant of the GoGra backdoor uses legitimate Microsoft infrastructure, relying on an Outlook inbox for stealthy payload delivery.
A previously undocumented data-wiping malware dubbed Lotus was used last year in targeted attacks against energy and utilities organizations in Venezuela.
A 24-year-old British national and senior member of the cybercrime group “ Scattered Spider ” has pleaded guilty to wire fraud conspiracy and aggravated identity theft.
41-year-old Angelo Martino, a former employee of cybersecurity incident response company DigitalMint, has pleaded guilty to targeting U.S. companies in BlackCat (ALPHV) ransomware attacks in 2023.
A SystemBC proxy malware botnet of more than 1,570 hosts, believed to be corporate victims, has been discovered following an investigation into a Gentlemen ransomware attack carried out by a gang affiliate.
This article challenges the common misconception that having backups alone is sufficient for business continuity. It highlights that while backups protect data, they do not ensure operational continuity during ransomware attacks or outages, which can result in costly downtime. Developers and businesses should consider implementing full Business Continuity and Disaster Recovery (BCDR) strategies rather than relying solely on backups.
German authorities have publicly identified 31-year-old Russian national Daniil Maksimovich Shchukin as 'UNKN', the leader behind the notorious REvil and GandCrab ransomware-as-a-service (RaaS) operations. He is accused of conducting at least 130 ransomware attacks against victims in Germany between 2019 and 2021. Developers and organizations should be aware that law enforcement continues to make progress in attributing major ransomware operations, and the REvil/GandCrab infrastructure and tactics remain a reference point for understanding modern ransomware threats.
Inside an OPSEC Playbook: How Threat Actors Evade Detection