UNC4899 Breached Crypto Firm After Developer AirDropped Trojanized File to Work Device
Ravie LakshmananMar 09, 2026DevOps / Threat Intelligence The North Korean threat actor…
Fake Tech Support Spam Deploys Customized Havoc C2 Across Organizations
Threat hunters have called attention to a new campaign as part of…
DoJ Seizes $61 Million in Tether Linked to Pig Butchering Crypto Scams
Ravie LakshmananFeb 27, 2026Financial Crime / Social Engineering The U.S. Department of…
UAC-0050 Targets European Financial Institution With Spoofed Domain and RMS Malware
Ravie LakshmananFeb 24, 2026Cyber Espionage / Malware A Russia-aligned threat actor has…
PromptSpy Android Malware Abuses Gemini AI to Automate Recent-Apps Persistence
Cybersecurity researchers have discovered what they say is the first Android malware…
How Lithuania Is Bracing for AI‑Driven Cyber Fraud
Presentation of the KTU Consortium Mission ‘A Safe and Inclusive Digital Society’…
Microsoft Discloses DNS-Based ClickFix Attack Using Nslookup for Malware Staging
Microsoft has disclosed details of a new version of the ClickFix social…
Google Ties Suspected Russian Actor to CANFAIL Malware Attacks on Ukrainian Orgs
Ravie LakshmananFeb 13, 2026Threat Intelligence / Malware A previously undocumented threat actor…
Google Reports State-Backed Hackers Using Gemini AI for Recon and Attack Support
Ravie LakshmananFeb 12, 2026Cyber Espionage / Artificial Intelligence Google on Thursday said…


