Sitemap
Pages
Posts by category
- Category: Cybercrime
- Category: Carding
- Category: Darkweb
- Australian Man Sentenced for Selling Ecstasy on the Darkweb
- Brave Browser Leaked DNS Queries for Onion Services
- Australian Border Force Seizes Meth Inside a Stuffed Llama
- New Change to German Postal Law Targets Internet Drug Trade
- Dream Market Vendor “Rackjaw2” Sentenced to Prison
- Feds Traced Bitcoin Transactions to a Drug Dealer’s Apartment
- Category: Fraud
- Category: The Deep Web
- Category: Hackers
- Category: Breaches
- Iranian Hacker Pleads Guilty in $19 Million Robbinhood Ransomware Attack on Baltimore
- Hackers Are Calling Your Office: FBI Alerts Law Firms to Luna Moth’s Stealth Phishing Campaign
- U.S. Dismantles DanaBot Malware Network, Charges 16 in $50M Global Cybercrime Operation
- 300 Servers and €3.5M Seized as Europol Strikes Ransomware Networks Worldwide
- Hackers Use TikTok Videos to Distribute Vidar and StealC Malware via ClickFix Technique
- FBI and Europol Disrupt Lumma Stealer Malware Network Linked to 10 Million Infections
- Ransomware Gangs Use Skitnet Malware for Stealthy Data Theft and Remote Access
- BianLian and RansomExx Exploit SAP NetWeaver Flaw to Deploy PipeMagic Trojan
- Qilin Ransomware Ranked Highest in April 2025 with 72 Data Leak Disclosures
- Russian Hackers Using ClickFix Fake CAPTCHA to Deploy New LOSTKEYS Malware
- Qilin Ransomware Ranked Highest in April 2025 with Over 45 Data Leak Disclosures
- Play Ransomware Exploited Windows CVE-2025-29824 as Zero-Day to Breach U.S. Organization
- Entra ID Data Protection: Essential or Overkill?
- Third Parties and Machine Credentials: The Silent Drivers Behind 2025’s Worst Breaches
- Automating Zero Trust in Healthcare: From Risk Scoring to Dynamic Policy Enforcement Without Network Redesign
- ToyMaker Uses LAGTOY to Sell Access to CACTUS Ransomware Gangs for Double Extortion
- RansomHub Went Dark April 1; Affiliates Fled to Qilin, DragonForce Claimed Control
- Nebulous Mantis Targets NATO-Linked Entities with Multi-Stage Malware Attacks
- Hackers Abuse Russian Bulletproof Host Proton66 for Global Attacks and Malware Delivery
- From Third-Party Vendors to U.S. Tariffs: The New Cyber Risks Facing Supply Chains
- FIN7 Deploys Anubis Backdoor to Hijack Windows Systems via Compromised SharePoint Sites
- Russian Hackers Exploit CVE-2025-26633 via MSC EvilTwin to Deploy SilentPrism and DarkWisp
- BlackLock Ransomware Exposed After Researchers Exploit Leak Site Vulnerability
- Hackers Repurpose RansomHub’s EDRKillShifter in Medusa, BianLian, and Play Attacks
- RedCurl Shifts from Espionage to Ransomware with First-Ever QWCrypt Deployment
- VSCode Marketplace Removes Two Extensions Deploying Early-Stage Ransomware
- Kaspersky Links Head Mare to Twelve, Targeting Russian Entities via Shared C2 Servers
- Medusa Ransomware Uses Malicious Driver to Disable Anti-Malware with Stolen Certificates
- ClearFake Infects 9,300 Sites, Uses Fake reCAPTCHA and Turnstile to Spread Info-Stealers
- Leaked Black Basta Chats Suggest Russian Officials Aided Leader’s Escape from Armenia
- SANS Institute Warns of Novel Cloud-Native Ransomware Attacks
- Live Ransomware Demo: See How Hackers Breach Networks and Demand a Ransom
- FIN7, FIN8, and Others Use Ragnar Loader for Persistent Access and Ransomware Operations
- Authorities Claim LockBit Admin “LockBitSupp” Has Engaged with Law Enforcement
- Medusa Ransomware Hits 40+ Victims in 2025, Demands $100K–$15M Ransom
- EncryptHub Deploys Ransomware and Stealer via Trojanized Apps, PPI Services, and Phishing
- The New Ransomware Groups Shaking Up 2025
- Hackers Exploit Paragon Partition Manager Driver Vulnerability in Ransomware Attacks
- Category: Phishing
- Category: Breaches
- Category: Malware
- Category: Malware Analysis
- Chinese government hackers attack Russian companies for the first time
- Rare UEFI Malware Found in the wild Kaspersky says
- How the Trickbot C2 uses rDNS to disguise as a legitimate Australian government service
- IcedID Malware Updates new techniques To Avoid Detection
- New Info Stealer Poulight From The Russian Underground
- Category: Threats
- Forced Chrome extensions get removed, keep reappearing
- ASyncRat surpasses Dridex, TrickBot and Emotet to become dominant email threat
- Credential-stealing malware disguises itself as Telegram, targets social media users
- Don’t let scammers ruin your Valentine’s Day
- SolarWinds attackers launch new campaign
- Smoking Out a DARKSIDE Affiliate’s Supply Chain Software Compromise
- The UNC2529 Triple Double: A Trifecta Phishing Campaign
- UNC2447 SOMBRAT and FIVEHANDS Ransomware: A Sophisticated Financial Threat
- Abusing Replication: Stealing AD FS Secrets Over the Network
- Ghostwriter Update: Cyber Espionage Group UNC1151 Likely Conducts Ghostwriter Influence Activity
- Zero-Day Exploits in SonicWall Email Security Lead to Enterprise Compromise
- Category: Malware Analysis
- Category: Security
- Category: Cloud Security
- Crawl, Walk, Run: Operationalizing Your IaC Security Program
- How To Prevent the IaC Misconfiguration Snowball Effect
- Prevent Secret Leaks: Find and Secure Secrets Across Your Repositories and Pipelines
- You Must Comply! Why You Need Proactive Open-Source License Compliance
- Infrastructure as Code Security and AppSec: Streamlined DevSecOps From App to Infra
- Prisma Cloud Provides New Extensive Use Cases for Azure Customers
- 6 Key Kubernetes DevSecOps Principles: People, Processes, Technology
- 9 Essential Infrastructure Security Considerations for Kubernetes
- Software Composition Analysis (SCA): How Does It Help Keep Cloud Applications Secure?
- Web Application Firewalls (WAFs): What You Need To Know About the Security Checkpoint for Your Web Application
- Building the Business Case for DevSecOps
- What is Infrastructure as Code? The Best Way to Fully Control Your Cloud Configuration
- Category: IoT
- A Roadmap to Secure Connected Cars: Charting the WP.29’s UN Regulation No. 155
- The Transition to 5G: Security Implications of Campus Networks
- Lost in Translation
- The Cybersecurity Blind Spots of Connected Cars
- New P2P Botnet Targeting IoT Devices
- IoT Security, Attacks And The Industrial Systems at Risk
- Category: Mobile
- Google removes 16 malicious apps from play store found to be part of the Joker malware family
- WhatsApp can be forced to decrypt WhatsApp Google Drive backups by state surveillance
- Vulnerabilities in old GTP protocol could affect 4G and 5G networks
- Google is indexing the phone numbers of WhatsApp Users
- Chinese authorities monitor content of WeChat users registered outside China
- Category: Threat Intelligence
- Pair of Galaxy App Store Bugs Offer Cyberattackers Mobile Device Access
- Hunting Insider Threats on the Dark Web
- FanDuel Sportsbook Bettors Exposed in Mailchimp Breach
- Ransomware Profits Decline as Victims Dig In, Refuse to Pay
- Attackers Crafted Custom Malware for Fortinet Zero-Day
- Cybercriminals Target Telecom Provider Networks
- Name That Toon: Poker Hand
- New Coalfire Report Reveals CISOs Rising Influence
- ChatGPT Could Create Polymorphic Malware Wave, Researchers Warn
- Initial Access Broker Market Booms, Posing Growing Threat to Enterprises
- Microsoft to Block Excel Add-ins to Stop Office Exploits
- ‘DragonSpark’ Malware: East Asian Cyberattackers Create an OSS Frankenstein
- Category: Web Applications
- Category: Cloud Security