Payload, a notorious ransomware group, has named Better House as its latest victim, threatening sensitive data in the high-stakes world of real estate. What does this mean for the industry and those who trust it?
Turkish users are being targeted by a stealthy ransomware campaign using a modified Adwind RAT, advanced obfuscation, and Tor-based communications. This localized attack demonstrates how smaller cybercriminal groups can evade detection and quietly extort victims for years.
Hackers are exploiting a trusted Intel-signed utility using AppDomain hijacking, bypassing security controls and launching stealthy malware campaigns that are nearly impossible to detect with traditional tools.
A new cybercrime service called FUD Crypt is arming hackers with Microsoft-signed, fully undetectable malware. By abusing Azure Trusted Signing, attackers can deploy persistent backdoors that blend in with legitimate system processes—no coding required.
FUD Crypt has weaponized Microsoft’s trusted signing to deliver invisible, command-enabled malware to paying subscribers. This exposé breaks down the platform’s evasion tactics and what it means for cybersecurity.
A new cybercrime platform called ATHR is making large-scale, AI-powered vishing and phone phishing attacks easier and more dangerous than ever—evading traditional defenses and putting organizations at risk.
Attackers are hijacking QEMU virtual machines to create invisible backdoors for credential theft and ransomware, making detection nearly impossible for security teams.
Thegentlemen ransomware group has targeted Friktimporten Stockholm, a leading Swedish produce distributor, raising fresh concerns over cyber risks in the food supply chain.
Cybercriminals are abusing Apple's legitimate account change alert emails to embed phishing messages, increasing the risk of users falling for scams that appear authentic. This feature explores the mechanics of the attack and offers tips for staying secure.
Qilin ransomware has targeted Nanometrics, a leader in precision technology. This feature unpacks the methods, the risks to intellectual property, and the latest trends in ransomware attacks.