A sophisticated cybercrime operation is targeting Booking.com partners and travelers through a two-stage phishing scheme. Attackers first compromise hotels, then use stolen booking data to scam guests. Discover how the campaign works and the techniques behind it.
Telegram channels are accelerating the weaponization of SmarterMail vulnerabilities, enabling ransomware groups to exploit email servers for initial access and lateral movement. Learn how attackers move from disclosure to breach in days—and how organizations can defend against the next wave.
Insomnia ransomware has claimed AdMark Asia Group as its latest victim, exposing the vulnerabilities of leading executive search firms and raising questions about cyber resilience in Asia's business sector.
On February 18, 2026, the University of Mannheim was named as the latest victim of the Qilin ransomware group. This cyberattack underscores the growing threat facing academic institutions worldwide.
Underground Carding-as-a-Service platforms like Findsome and UltimateShop are turning stolen credit card data into a booming criminal business, putting millions at risk of fraud and identity theft. Here’s how the ecosystem works—and why it’s so hard to stop.
Cybercriminals leveraged Atlassian Jira Cloud’s email reputation to launch sophisticated, multilingual scam campaigns targeting investors and organizations. Learn how they bypassed defenses and what you can do to stay safe.
A new investigation reveals the sophisticated tactics, tools, and underground markets fueling the rise of organized cybercrime, now one of the world’s largest economies.
Ransomware and hacktivist attacks soared by 78% in Latin America in 2025, exposing critical vulnerabilities across industries and threatening global supply chains. Intel 471’s new report reveals the region’s cybercrime crisis is spiraling, fueled by digital transformation, weak defenses, and growing state-sponsored activity.
Hackers are exploiting QR codes to launch phishing and malware attacks on mobile users, using techniques like QR code shorteners and deep links. Learn how these scams work and how to stay safe.
A sweeping, multi-stage phishing operation is exploiting Booking.com partners to steal hotel credentials and defraud guests. Learn how attackers combine social engineering, advanced phishing kits, and infrastructure tricks in this evolving cybercrime campaign.