A British man at the helm of the Scattered Spider cybercrime group has pleaded guilty to orchestrating a massive $8 million cryptocurrency heist, revealing the inner workings of one of the most notorious hacking collectives of recent years.
Trusted paths—from browser extensions to update channels—are being exploited for stealthy, multi-stage cyberattacks. This week’s feature investigates how the ordinary became the new battleground for malware, supply-chain hacks, and AI-powered scams.
A British national’s confession exposes a sophisticated campaign of phishing and SIM swapping that netted millions in cryptocurrency from major U.S. firms. Here’s how the cybercriminals did it—and what it means for the future of digital security.
Payload, a notorious ransomware group, has named Better House as its latest victim, threatening sensitive data in the high-stakes world of real estate. What does this mean for the industry and those who trust it?
Turkish users are being targeted by a stealthy ransomware campaign using a modified Adwind RAT, advanced obfuscation, and Tor-based communications. This localized attack demonstrates how smaller cybercriminal groups can evade detection and quietly extort victims for years.
Hackers are exploiting a trusted Intel-signed utility using AppDomain hijacking, bypassing security controls and launching stealthy malware campaigns that are nearly impossible to detect with traditional tools.
A new cybercrime service called FUD Crypt is arming hackers with Microsoft-signed, fully undetectable malware. By abusing Azure Trusted Signing, attackers can deploy persistent backdoors that blend in with legitimate system processes—no coding required.
FUD Crypt has weaponized Microsoft’s trusted signing to deliver invisible, command-enabled malware to paying subscribers. This exposé breaks down the platform’s evasion tactics and what it means for cybersecurity.
A new cybercrime platform called ATHR is making large-scale, AI-powered vishing and phone phishing attacks easier and more dangerous than ever—evading traditional defenses and putting organizations at risk.
Attackers are hijacking QEMU virtual machines to create invisible backdoors for credential theft and ransomware, making detection nearly impossible for security teams.