Exploits

FBI: ATM ‘Jackpotting’ Attacks Soar, $20M Stolen In 2025 Alone / Fresh Today / CUToday.info

WASHINGTON— Malware-wielding criminals “jackpotted” ATMs across the United States last year, walking away with an estimated $20 million in stolen cash, according to reporting...

Double whammy: Steaelite RAT bundles data theft, ransomware in one evil tool

A new remote access trojan (RAT) being sold on cybercrime networks enables double extortion attacks on Windows machines by bundling ransomware and data theft,...

Life Mirrors Art: Ransomware Hits Hospitals on TV & IRL

HBO's "The Pitt" is showing audiences what a real Mississippi healthcare system is going through this week, thanks to a ransomware attack. 

APT37 hackers use new malware to breach air-gapped networks

North Korean hackers are deploying newly uncovered tools to move data between internet-connected and air-gapped systems, spread via removable drives, and conduct covert surveillance. The...

Ransomware payments drop to record low, even as attacks surge

(Image credit: Shutterstock / JLStock) Share this article 0 Join the conversation Follow us Add us as a preferred source on Google Subscribe to our newsletter Chainalysis finds ransomware incidents...

CISA warns that RESURGE malware can be dormant on Ivanti devices

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has released new details about RESURGE, a malicious implant used in zero-day attacks exploiting CVE-2025-0282 to...

All-in-one RAT combines credential theft, ransomware, DDoS and more

Steaelite allows cybercriminals to control victims’ machines through a single browser panel. 

New CISA guidance targets persistent RESURGE implant as Ivanti Connect Secure threat continues to deepen

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued an updated malware analysis report detailing new findings on RESURGE, a stealthy implant designed to...

Ransomware: As Infostealers Bite, Prevention Beats Recovery

Online attackers are increasingly stealing data and holding it to ransom without encrypting files, doubling down on the use of credentials gathered by 

Latest articles