UnsolicitedBooker targets Central Asian telecoms with LuciDoor and MarsSnake, while PseudoSticky and Cloud Atlas hit Russia.
Identity risk escalates when control gaps, hygiene failures, impact, and intent align, forming toxic combinations that drive real breaches ...
Lazarus Group used Medusa ransomware in Middle East and U.S. healthcare attacks, with average $260,000 demands and 366 claimed incidents.
Russia-linked UAC-0050 targeted a European financial institution using a spoofed Ukrainian domain to deploy RMS remote access malware.
The campaigns detailed by AI upstart entail the use of fraudulent accounts and commercial proxy services to access Claude at scale while avoiding detection. Anthropic said it was able to attribute ...
AI attackers exploit Microsoft 365 misconfigurations at scale, with 13M phishing emails blocked in October 2025.
FBI reports 1,900 ATM jackpotting cases since 2020, with $40.73M lost to Ploutus malware bypassing bank authorization.
Massiv Android trojan hides in fake IPTV apps, enabling remote device control, credential theft, and fraudulent banking ...
Critical vulnerabilities in four widely used VS Code extensions could enable file theft and remote code execution across 125M ...
Researchers show AI assistants can act as stealth C2 proxies, enabling malware communication, evasion, and runtime attack ...
Critical CVE-2026-2329 flaw in Grandstream GXP1600 VoIP phones enables unauthenticated RCE, call interception, and credential ...
PromptSpy Android malware abuses Google Gemini to analyze screens, automate persistence, block removal, and enable VNC-based ...