
Tools

AI-Generated Malware Powers New Ransomware Campaign by Hive0163
Cybersecurity researchers have discovered that the ransomware group Hive0163 is using AI-generated malware called Slopoly to maintain persistent access during attacks. The discovery highlights how threat actors are leveraging artificial intelligence to rapidly develop new malware frameworks.
Latest

England Hockey Probes Ransomware Attack by AiLock Gang
England Hockey is investigating a potential data breach after the AiLock ransomware group claimed to have stolen 129GB of data from the organization. The governing body for field hockey in England is working with external specialists and law enforcement as the threat actors demand ransom payment.

Telus Digital Confirms Data Breach After Hacker Claims 1PB Theft
Telus Digital has confirmed a cybersecurity incident following claims by ShinyHunters hackers of stealing nearly 1 petabyte of data. The breach allegedly affects multiple client companies that use Telus Digital's business process outsourcing services.

Microsoft March 2026 Patch Tuesday: Two Zero-Days Under Attack
Microsoft's March 2026 Patch Tuesday addresses two zero-day vulnerabilities currently being exploited by attackers. One bypasses Windows' Mark of the Web security warnings, while the other escalates privileges to SYSTEM level, creating a dangerous attack chain when combined.

Epicenter.tech Breach Exposes Enterprise AI Security Gaps
The Epicenter.tech security breach spanning 2024-2026 highlights critical vulnerabilities in enterprise AI infrastructure and cloud integrations. The incident demonstrates how modern multi-environment architectures create complex security dependencies that traditional cybersecurity models struggle to protect.

Unit 42 Reports 90% of Cyberattacks Exploit Identity Weaknesses
Palo Alto Networks' Unit 42 responded to over 750 major cyber incidents in 2025, revealing that identity vulnerabilities played a material role in nearly 90% of investigations. The report highlights four major trends shaping 2026's threat landscape, including AI acceleration of attacks and supply chain exploitation.

Identity Compromise Behind 80% of Cyber Incidents, Report Shows
Field Effect's 2026 Cyber Threat Outlook reveals that more than 80% of cybersecurity incidents investigated in 2025 stemmed from cloud identity compromise, marking a significant shift in attack strategies. The report shows threat actors are increasingly bypassing traditional exploits by abusing trusted identities and collaboration platforms to gain corporate access.

Identity Compromise Behind 80% of Cyber Incidents in 2025
Field Effect's 2026 Cyber Threat Outlook reveals that more than 80% of cybersecurity incidents investigated in 2025 stemmed from cloud identity compromise, marking a significant shift in attack methods. The report shows attackers are increasingly bypassing traditional exploits by abusing trusted identities and collaboration platforms like Microsoft Teams.
.jpg)
Major Data Breach Affects Multiple Mexican Government Agencies
A recent data breach compromised sensitive information from various Mexican government agencies, including SAT, exposing personal data of millions. The incident highlights the growing threat of AI-driven cybercrime.

Analyzing VEN0m Ransomware: Detection, Engineering, and Recovery Insights
A recent analysis of VEN0m ransomware reveals its bypass techniques, detection challenges, and the simplicity of key recovery. This report provides a comprehensive overview of attack methodologies and defensive strategies.

Cheyenne and Arapaho Tribes Rebound from Ransomware Attack
Following a ransomware attack, the Cheyenne and Arapaho Tribes are well into their recovery, emphasizing resilience amid rising cyber threats against tribal governments. Their commitment to cybersecurity is underscored by non-negotiation with attackers.

Gentlemen Ransomware: A High-Velocity RaaS Threat Analysis
The Gentlemen ransomware operation has quickly become a formidable force in the cybercrime landscape. This analysis explores its origins, methods, and target profiles, showcasing the evolving world of Ransomware-as-a-Service.
