Latest Articles
Albemarle County Ransomware Breach Compromises Residents’ Personal Data
Albemarle County officials announced a significant ransomware attack that compromised sensitive personal data belonging to county employees, public school personnel, and residents.According to...
Dark 101 Ransomware Deploys .NET Payload to Cripple Recovery Mode and Task Manager
The FortiGuard Labs team has uncovered a new ransomware variant, identified as "Dark 101," which aligns with the persistent Dark 101 malware family.This...
Microsoft Showcases How Security Copilot in Intune and Entra Empowers IT and Security Teams
Microsoft has announced the general availability of its Security Copilot integrations within Microsoft Intune and Microsoft Entra, cementing its strategy for delivering AI-powered, scenario-based...
Federal IT Contractor Fined $14.75M for Misrepresenting Cybersecurity Services
Hill ASC Inc., operating as Hill Associates, based in Rockville, Maryland, has agreed to pay a minimum of $14.75 million to settle claims that...
DShield Honeypot Logs Surge Past 1 Million in a Single Day, Setting New Record
Honeypot operators worldwide have long understood that their traps rarely run silent for long, with a constant background hum of scanning and malicious activity...
Kafbat UI Vulnerabilities Enable Arbitrary Code Execution via JMX Services
Kafbat UI, the popular open-source dashboard for Apache Kafka, has been hit by CVE-2025-49127—a critical remote-code-execution (RCE) flaw scored CVSS 10.0.Version 1.0.0 blindly...
Octalyn Stealer Extracts VPN Data, Credentials, and Cookies into Structured Directories
The Octalyn Forensic Toolkit, a publicly available project on GitHub, is gaining notoriety in the cybersecurity community after a deep technical analysis revealed its...
Global RaaS Operators Integrate AI to Automate Ransom Negotiations
A sophisticated new ransomware-as-a-service (RaaS) operation called GLOBAL GROUP has emerged, featuring AI-powered negotiation systems and mobile control panels for affiliates.The group, operated...
North Korean Hackers Weaponize 67 npm Packages to Deploy XORIndex Malware
The Socket Threat Research Team has identified a major escalation in North Korean cyberattacks on the open-source ecosystem, as threat actors behind the “Contagious...
New AsyncRAT Forks Discovered with Advanced Features Like Screamers and USB Spreaders
AsyncRAT has evolved from a straightforward remote access trojan into a complex ecosystem of forks and variants.ESET researchers have mapped out the intricate...