- Home
- Cybercrime and Ransomware
- Emerging Tech
- Threat Intelligence
- Expert Insights
- Careers and Learning
- Compliance
Subscribe to Updates
Subscribe to our newsletter and never miss our latest news
Subscribe my Newsletter for New Posts & tips Let's stay updated!
Browsing: malware
Top Highlights Phantom Taurus, a newly confirmed Chinese espionage group, has targeted nearly 10 organizations…
Fast Facts Two Russian state-sponsored hacking groups, Gamaredon and Turla, have collaborated recently in cyberattacks…
Fast Facts Infostealers, part of malware-as-a-service (MaaS), have evolved into sophisticated, stealthy tools that silently…
Summary Points AI-powered ransomware, PromptLock, has been discovered as a proof-of-concept, capable of performing traditional…
Top Highlights Microsoft uncovered PipeMagic, a modular backdoor used in ransomware attacks, masquerading as a…
Crypto24 Ransomware Combines Legitimate Tools and Custom Malware to Target Manufacturing and More
Top Highlights Crypto24 is a sophisticated ransomware group that employs legitimate tools, custom malware, and…
Summary Points Complex Infiltration Tactics: North Korean hackers, identified as APT BlueNoroff, are using deceptive…
Quick Takeaways Infection Methodology: Fake installers disguised as legitimate software (e.g., WPS Office) from Chinese-language…
Fast Facts Malware Deployment: A Russian state-sponsored hacking group, APT28, has infected Ukrainian government entities…
Summary Points Surge in Activity: An updated variant of the Prometei malware, a modular botnet…