Threat hunters have shed light on a sophisticated and evolving malware toolkit called Ragnar Loader that's used by various cybercrime and ransomware groups like Ragnar Locker (aka Monstrous Mantis), FIN7, FIN8, and Ruthless Mantis (ex-REvil).
Discover how Tulsi Gabbard, the Director of National Intelligence, is navigating the complex world of surveillance programs she once opposed. Dive into her journey from anti-surveillance advocate to key overseer.
Discover how the Akira ransomware gang used an unsecured webcam to launch encryption attacks, effectively bypassing Endpoint Detection and Response (EDR) systems. Learn about this sophisticated cyber threat and its implications for cybersecurity.
Discover how over 1,000 WordPress sites have been infiltrated by sophisticated JavaScript backdoors, allowing attackers persistent access. Learn about the intricate methods used and how to protect your site.
Microsoft has shut down numerous GitHub repositories involved in a vast malvertising campaign that compromised nearly one million devices globally. Learn about the impact, prevention, and the future of digital security.
Discover how the financially motivated threat actor EncryptHub orchestrates complex phishing campaigns to deploy ransomware and information stealers through trojanized apps and PPI services. Learn about their new product, EncryptRAT, and stay informed with insights from Outpost24 KrakenLabs.
Discover how international law enforcement united to dismantle Garantex, a Russian cryptocurrency exchange favored by ransomware gangs like Conti for money laundering. Learn about the significance of this operation and its impact on cybercrime.
Discover how the U.S. Secret Service, in a joint operation with the FBI and Europol, seized the domain of Garantex, a sanctioned Russian crypto exchange implicated in ransomware activities. Learn about the impact on cybersecurity and the global effort to combat digital crimes.
Discover the shocking extent of the Toronto Zoo's January 2024 cyberattack, where ransomware crooks snatched visitor data dating back to 2000. Learn about the impact and implications of this massive data breach.
Explore the potential expansion of USCIS social media monitoring for all non-citizens and immigrants. Learn about the implications, processes, and controversies surrounding this enhanced vetting initiative. Read this article to understand how this could impact immigration policies and privacy concerns.
Discover how the US Army's CamoGPT is transforming training materials to enhance productivity and operational readiness while aligning with diversity, equity, and inclusion policies.
Uncover the alarming Pentagon budget cuts that could slash up to 75% of personnel dedicated to preventing the spread of chemical, biological, and nuclear weapons.
Discover the alarming rise of Medusa ransomware in 2025, with over 40 victims in just two months and ransom demands soaring to $100K–$15M. Explore the latest insights and data from Symantec Threat Hunter Team and other authoritative sources.
Elastic addresses a critical vulnerability in Kibana, enabling arbitrary code execution. Learn how this flaw impacts Elasticsearch visualization and how to mitigate risks.
Discover the urgent need for a $75 million investment to bolster cybersecurity in rural US hospitals, protecting them from ransomware attacks and ensuring patient safety. Learn about the escalating threats, the impact on healthcare facilities, and the preventive measures that can save lives.
The U.S. Department of Justice (DoJ) has charged 12 Chinese nationals, including government officers and hackers, for their roles in a global cyber espionage campaign. This coordinated effort involved data theft and suppression of dissent, targeting U.S. critics, Asian governments, and key U.S. agencies. The indictment reveals the intricate web of state-sponsored hacking and the U.S. response to safeguard national security.
A senior software developer has been found guilty of sabotaging his former employer's systems, potentially facing ten years in prison. Learn about the implications and consequences of this cyber attack.
Threat actors have launched a malicious campaign targeting organizations in Japan since January 2025. The attackers exploit the PHP-CGI RCE vulnerability (CVE-2024-4577) to gain access to victim machines.
Are you tired of dealing with outdated security tools that never seem to give you the full picture? You're not alone. Many organizations struggle with piecing together scattered information, leaving your apps vulnerable to modern threats. That's why we're excited to introduce a smarter, unified approach: Application Security Posture Management (ASPM). ASPM brings together the best of both worlds by combining proactive measures with reactive strategies to enhance your security posture.
Mirai-based botnets are exploiting a zero-day flaw in Edimax IP cameras for remote command execution. US CISA warns of the vulnerability, urging organizations to report suspicious activity. Learn more about the impact and mitigation strategies.
Microsoft has unveiled a large-scale malvertising campaign impacting over one million devices worldwide, aimed at stealing sensitive information. Detected in early December 2024, this campaign, dubbed Storm-0408, highlights the evolving threats in online advertising.
The FBI's Internet Crime Complaint Center (IC3) has issued a critical alert about a data extortion scam targeting corporate executives. Cybercriminals, posing as the 'BianLian Group,' send threatening letters demanding payment to prevent the release of sensitive information. Learn how to protect your organization and report incidents to CISA.
Geopolitical tensions between the US and Iran have escalated following failed peace talks, undermining short-term diplomatic optimism and destabilizing market confidence in global financial and cybersecurity sectors. The inability to resolve differences may indirectly increase the risk of state-sponsored cyber operations targeting critical infrastructure or private entities. Organizations with exposure to US-Iran relations must heighten situational awareness and review contingency plans.