More

    Exploits

    BMW purportedly infiltrated by Everest ransomware gang

    Russia-linked Everest ransomware operation has laid claim to compromising major German multinational luxury automaker BMW Group, according to Cybernews. 

    Brain Cypher ransomware alleges major Baltimore Medical System breach

    Cybernews reports that Baltimore Medical System, Maryland's leading federally funded health system, had several terabytes of its data purportedly exfiltrated by the Brain Cipher...

    Windows targeted by XillenStealer payload

    Attacks with the new Python-based XillenStealer malware have been launched to exfiltrate system information, cryptocurrency wallet details, and browser credentials from Windows systems, reports...

    SystemBC malware turns infected VPS systems into proxy highway

    The operators of the SystemBC proxy botnet are hunting for vulnerable commercial virtual private servers (VPS) and maintain an average of 1,500 bots every...

    Supply Chain Wormable? NPM Packages with Self-Propagating Malware Arrive

    Over 180 npm packages infected with self-propagating malware, a campaign dubbed Shai-Hulud. 

    Elastio detects real-time, zero-day, malware backup infection

    Elastio’s Model Context Protocol (MCP) Server embeds agentless ransomware detection and backup validation directly into AWS workflows, developer tooling, and AI assistants, with claimed...

    Qilin Ransomware Attack Impacts 104 Organizations in August

    In August, Qilin once again reigned supreme in the global ransomware arena, claiming 104 victims and nearly doubling the total of second-place Akira, which...

    CountLoader Broadens Russian Ransomware Operations With Multi-Version Malware Loader

    Cybersecurity researchers have discovered a new malware loader codenamed CountLoader that has been put to use by Russian ransomware gangs to deliver post-exploitation tools...

    The Top Exploited Vulnerabilities Leading to Ransomware in 2025 — and How to Stay Ahead 

    Ransomware in 2025 is fueled by zero-day exploits and edge device flaws. Learn how preemptive cyber defense stops attacks before they launch. 

    Latest articles