Browser extensions turned malicious after years of legitimate operation in DarkSpectre campaign affecting millions. The ...
Critical n8n flaw CVE-2025-68668 allows authenticated users to run system commands via workflows; affects versions 1.0.0 to ...
A new Python-based malware called VVS stealer has been identified, targeting Discord users with stealthy techniques to steal ...
This weekly recap brings those stories together in one place. No overload, no noise. Read on to see what shaped the threat ...
A ransomware variant favored by a pro-Russia hacktivist group is back on the scene with a new version that has a fatal flaw — it keeps artifacts that allow victims to decrypt their files. VolkLocker ...
The cybercrime-as-a-service model has a new product line, with malicious large language models built without ethical guardrails selling on Telegram for $50 monthly or distributed free on GitHub.
Healthcare organizations are facing evolving ransomware tactics as data extortion attacks are on the rise. Cyber attackers are taking advantage of the sensitive data held by healthcare providers to ...
A seasonal surge in malicious activity combined with alliances between ransomware groups led to a 41% increase in attacks between September and October. Cybercriminal group Qilin continues to be the ...
NHS England is investigating the possibility that it has fallen victim to a prolific ransomware operation, after the Cl0p (aka Clop) gang claimed to have hacked its systems via a post to its dark web ...
Helping companies pay ransoms to digital extortionists is kind of an odd business. On the one hand, you “negotiate” with cybercriminals and in so doing may drive down the costs of recovering from a ...
Two former employees of cybersecurity firms that sold services helping companies combat hackers have been indicted and accused of participating in a conspiracy, outside of their day jobs, to hack ...
Small businesses aren’t too small to be targeted by cybercriminals, and the consequences can be worse. That’s why protecting against ransomware attacks should be a top priority. “Ransomware can be ...