A surge in cyber scams is targeting online travel bookings. Discover how hackers operate, what the authorities advise, and the steps you can take to protect your holiday plans.
Black Shrantac is a new ransomware group weaponizing legitimate tools and double extortion tactics to devastate global organizations. Their stealthy methods blend into normal operations, making traditional defenses ineffective.
A stealthy ransomware wave is sweeping across Turkey, powered by a customized Adwind RAT and the new JanaWare ransomware. Learn how attackers blend technical tricks with local targeting to evade detection and extort victims.
Hackers are hijacking Microsoft 365 inboxes by abusing mailbox rules, enabling silent theft of business emails and financial fraud—all without malware. Discover how these attacks work and the urgent steps needed to defend your organization.
The HanGhost loader campaign targets employees in payments and logistics, using fileless and evasive malware to infiltrate business-critical systems. Discover how this threat operates and what security teams must do to detect it before it’s too late.
Mirax, a sophisticated Android malware, is quietly transforming infected phones into residential proxies for cybercriminals. Learn how this exclusive, Russian-speaking operation blends banking theft with botnet power and what it means for the future of mobile security.
ITC Group has become the latest high-profile victim of a ransomware attack, highlighting the growing threat of double extortion and public data leaks in the cybercrime world.
ServiceMaster Clean Services, a Memphis-based cleaning company, has fallen victim to the Akira ransomware group. The attackers claim to hold sensitive employee and client data, threatening to publish it online as part of their extortion tactics.
A cybercrime botnet targeting Twitter/X accounts was found with its admin panel and root credentials exposed, turning the tables on its operators and highlighting the importance of basic security hygiene.
Mirax, a cutting-edge Android RAT, is spreading across Europe, turning everyday smartphones into covert proxies for cybercriminals. Discover how this malware combines banking theft, spyware, and proxy tech to fuel a new wave of mobile threats.