News

One notable example is the rise in cases where predators prey on teenagers, coercing them into sharing intimate content and then demanding money or further compromising materials under threat of ...
The suspected architect of the Ransomware-as-a-service model, who called himself the “J.P. Morgan” of the underground cybercrime world, has been arrested and extradited from Poland to the U.S., where ...
Past Sanctions in Australia This latest round of sanctions follows a similar move earlier in 2024 when Aleksandr Ermakov was sanctioned for his alleged involvement in the Medibank cyberattack. The ...
ManticoraLoader, a new malware-as-a-service (MaaS), was observed on the cybercriminal XSS forum being distributed by ‘DarkBLUP,’ an alias that was previously used to distribute malware from the ...
Qilin became the top ransomware group in April amid uncertainty over the status of RansomHub, according to a Cyble blog post published today. RansomHub’s data leak site (DLS) went offline on April 1, ...
Source: FBI Cyber Division Domain Seizure Details The Justice Department’s operation unfolded over several days in May 2025: May 19, 2025: The government seized two domains linked to the LummaC2 ...
In response to a recent cyberattack, the City of Columbus is taking significant steps to protect its employees. On July 18, 2024, a ransomware group claimed the Columbus cyberattack, prompting an ...
Phishing, Ransomware, and BEC Still Widespread While digital sextortion may be the most disturbing development, it’s not the only threat overwhelming African systems. Phishing — primarily through ...
India’s cryptocurrency exchange WazirX has revealed that 43% of customer funds lost in a recent cyberattack are unlikely to be recovered, according to the company’s legal advisers. In a virtual press ...
A Campaign of Cyber Intrusion June 2017: Purbeck breached the computer systems of a medical clinic in Griffin, Georgia, and extracted sensitive records containing personal data—including names, ...
The notorious hacker group 888 has claimed responsibility for a Shell data breach targeting the British multinational oil and gas company. According to their claims, approximately 80,000 individuals ...
The Trojanized Google reCAPTCHA and the PowerShell scripts it runs. (Source: CERT-UA) APT28’s tactics demonstrate how these groups exploit familiar actions in routine tasks to mask their intentions.