Malware

Russian Cybercriminal Charged in $24 Million Qakbot Ransomware Scheme

The U.S. Department of Justice unsealed federal charges Thursday against Russian national Rustam Rafailevich Gallyamov, 48, for allegedly orchestrating one…

4 weeks ago

New Blackhat AI Tool Venice.ai Let Attackers Create Malware in Minutes

A new artificial intelligence platform called Venice.ai is raising serious cybersecurity concerns after researchers discovered it can generate functional malware,…

4 weeks ago

CISA Warns of Russian Hackers Attacking Logistics & IT Companies with Windows Utilities

The Cybersecurity and Infrastructure Security Agency (CISA), alongside the National Security Agency (NSA), the Federal Bureau of Investigation (FBI), and…

1 month ago

3 Ways MSSPs Can Boost Security Operations With Malware Sandbox

Managed Security Service Providers (MSSPs) face constant pressure to deliver accurate detection, fast response, and efficient training without overloading their…

1 month ago

Cellcom Confirms Cyberattack Following Widespread Service Outage

After nearly a week of disrupted services, Wisconsin-based telecommunications provider Cellcom has officially confirmed that a cyberattack is responsible for…

1 month ago

PupkinStealer Attacks Windows System to Steal Login Credentials & Desktop Files

A new information-stealing malware dubbed "PupkinStealer" has been identified by cybersecurity researchers, targeting sensitive user data through a straightforward yet…

1 month ago

Malware Mastermind Andrei Tarasov Evades US Extradition Returns to Russia

In a significant setback for US cybercrime enforcement efforts, Russian hacker Andrei Tarasov has evaded extradition to the United States…

1 month ago

Xanthorox – New BlackHat AI Tool Used to Launch Phishing & Malware Attacks

The Xanthorox tool first appeared on dark web forums and cybersecurity blogs in April 2025. Xanthorox is not just another rogue…

1 month ago

Top 5 WMIC Commands Used By Malware

Malware doesn’t need fancy tools to be dangerous. Sometimes, all it takes is WMIC, a quiet, native utility that’s still…

1 month ago

Google Threat Intelligence Launches Actionable Technique To Hunt for Malicious .Desktop Files

Google Threat Intelligence has launched a new blog series aimed at empowering security professionals with advanced threat hunting techniques, kicking…

1 month ago