Exploits

VulnCheck finds ransomware operators increasingly relying on zero-days, raising risk in OT environments

New VulnCheck data disclosed that out of more than 48,000 newly disclosed CVEs in 2025, barely 1% were exploited in the wild, yet those...

Google Disrupts UNC2814 GRIDTIDE Malware Abusing Google Sheets API in Global Telecom and Government Espionage

top of page Book A Demo Yes, subscribe me to your newsletter. Rescana harnesses agentic AI to simplify third-party and external risk management, putting defenders firmly in...

Ransomware payment rate drops to record low as attacks surge

The number of ransomware victims paying threat actors has dropped to 28% last year, an all-time low, despite a significant increase in the number of claimed...

Ransomware payments dropped in 2025 as attack numbers reached record levels: Chainalysis

The number of ransomware victims paying up to unlock systems is falling significantly even as the total number of incidents increases. Blockchain...

Varist Introduces Hyperscale Malware Detection to Counter Complex AI-Powered Threats

This is a paid press release. Contact the press release distributor directly with any inquiries. Business Wire 3 min read Hybrid Detection Engine™ detects previously unseen...

Trend Micro Apex One: Malware protection with critical security vulnerabilities

The name sounds like a line of defense. The reality is more unpleasant. Security researchers have discovered several vulnerabilities in Trend Micro Apex One,...

Steaelite RAT combines data theft and ransomware management capability in one tool

Researchers at BlackFog say the SaaS tool lowers the barrier to end-to-end ransomware campaigns. 

How APT28 Targeted European Entities Using Webhook-Based Macro Malware

Advanced Persistent Threat (APT) groups are often associated with zero-day exploits and custom-built malware frameworks. However, the latest campaign attributed to APT28 demonstrates that...

Fake ‘interview’ repos lure Next.js devs into running secret-stealing malware

Next.js developers are once again in the crosshairs as hackers seed malicious repositories disguised as legitimate projects, according to Microsoft, which said a limited...

Latest articles