More

    Exploits

    Hackers now use Velociraptor DFIR tool in ransomware attacks

    Threat actors have started to use the Velociraptor digital forensics and incident response (DFIR) tool in attacks that deploy LockBit and Babuk ransomware. Cisco Talos...

    Fake VPN and streaming app drops malware that drains your bank account

    Security researchers are warning Android users to delete a fake VPN and streaming app that can let criminals take over their phones and drain...

    Extensive browser targeting conducted by novel Shuyal Stealer malware

    Newly emergent Shuyal Stealer malware could pilfer login credentials from 19 different web browsers, including Google Chrome, Microsoft Edge, Opera and Opera GX, Epic,...

    New Polymorphic Python Malware Repeatedly Mutate its Appearance at Every Execution Time

    Nirorat.py, a Python RAT, mutates its code each run to evade AV, using introspection and self-modifying functions for stealth. 

    From HealthKick to GOVERSHELL: The Evolution of UTA0388’s Espionage Malware

    A China-aligned threat actor codenamed UTA0388 has been attributed to a series of spear-phishing campaigns targeting North America, Asia, and Europe that are designed...

    Chaos Emerges as Faster, Smarter, and More Dangerous Ransomware

    In recent weeks, security teams worldwide have grappled with a new ransomware strain that has shattered expectations for speed and sophistication. First detected in...

    Chaos Ransomware Evolves to Become Faster, Smarter and More Dangerous

    Chaos ransomware has undergone a significant transformation in 2025, marking its first departure from .NET programming with the introduction of Chaos-C++, a sophisticated variant that...

    3 infamous ransomware crews collab to ‘maximize income’

    Following in the footsteps of an earlier unholy alliance between three other cybercrime crews, ransomware-as-a-service giants DragonForce, Qilin, and LockBit claim to be collaborating...

    Latest articles