Have You Turned Off Your Virtual Oven?
You check that the windows are shut before leaving home. Return to…
What Attackers Are Doing With Them
When an organization's credentials are leaked, the immediate consequences are rarely visible—but…
Qilin Ransomware Adds “Call Lawyer” Feature to Pressure Victims for Larger Ransoms
The threat actors behind the Qilin ransomware-as-a-service (RaaS) scheme are now offering…
300 Servers and €3.5M Seized as Europol Strikes Ransomware Networks Worldwide
May 23, 2025Ravie LakshmananRansomware / Dark Web As part of the latest…
Germany Shuts Down eXch Over $1.9B Laundering, Seizes €34M in Crypto and 8TB of Data
May 10, 2025Ravie LakshmananCryptocurrency / Cybercrime Germany's Federal Criminal Police Office (aka…
Europol Shuts Down Six DDoS-for-Hire Services Used in Global Attacks
May 07, 2025Ravie LakshmananDark Web / Cybercrime Europol has announced the takedown…
Initial Access Brokers Shift Tactics, Selling More for Less
What are IABs? Initial Access Brokers (IABs) specialize in gaining unauthorized entry…
Leaked Black Basta Chats Suggest Russian Officials Aided Leader’s Escape from Armenia
Mar 19, 2025Ravie LakshmananCybercrime / Threat Intelligence The recently leaked trove of…
EncryptHub Deploys Ransomware and Stealer via Trojanized Apps, PPI Services, and Phishing
Mar 06, 2025Ravie LakshmananMalware / Ransomware The financially motivated threat actor known…