Category

Tools

60 articles
AI-Generated Malware Powers New Ransomware Campaign by Hive0163
Featured2d ago

AI-Generated Malware Powers New Ransomware Campaign by Hive0163

Cybersecurity researchers have discovered that the ransomware group Hive0163 is using AI-generated malware called Slopoly to maintain persistent access during attacks. The discovery highlights how threat actors are leveraging artificial intelligence to rapidly develop new malware frameworks.

Read article

Latest

England Hockey Probes Ransomware Attack by AiLock Gang
Cybersecurity3d ago

England Hockey Probes Ransomware Attack by AiLock Gang

England Hockey is investigating a potential data breach after the AiLock ransomware group claimed to have stolen 129GB of data from the organization. The governing body for field hockey in England is working with external specialists and law enforcement as the threat actors demand ransom payment.

Telus Digital Confirms Data Breach After Hacker Claims 1PB Theft
Cybersecurity3d ago

Telus Digital Confirms Data Breach After Hacker Claims 1PB Theft

Telus Digital has confirmed a cybersecurity incident following claims by ShinyHunters hackers of stealing nearly 1 petabyte of data. The breach allegedly affects multiple client companies that use Telus Digital's business process outsourcing services.

Microsoft March 2026 Patch Tuesday: Two Zero-Days Under Attack
Cybersecurity4d ago

Microsoft March 2026 Patch Tuesday: Two Zero-Days Under Attack

Microsoft's March 2026 Patch Tuesday addresses two zero-day vulnerabilities currently being exploited by attackers. One bypasses Windows' Mark of the Web security warnings, while the other escalates privileges to SYSTEM level, creating a dangerous attack chain when combined.

Epicenter.tech Breach Exposes Enterprise AI Security Gaps
Cybersecurity4d ago

Epicenter.tech Breach Exposes Enterprise AI Security Gaps

The Epicenter.tech security breach spanning 2024-2026 highlights critical vulnerabilities in enterprise AI infrastructure and cloud integrations. The incident demonstrates how modern multi-environment architectures create complex security dependencies that traditional cybersecurity models struggle to protect.

Unit 42 Reports 90% of Cyberattacks Exploit Identity Weaknesses
Cybersecurity4d ago

Unit 42 Reports 90% of Cyberattacks Exploit Identity Weaknesses

Palo Alto Networks' Unit 42 responded to over 750 major cyber incidents in 2025, revealing that identity vulnerabilities played a material role in nearly 90% of investigations. The report highlights four major trends shaping 2026's threat landscape, including AI acceleration of attacks and supply chain exploitation.

Identity Compromise Behind 80% of Cyber Incidents, Report Shows
Cybersecurity5d ago

Identity Compromise Behind 80% of Cyber Incidents, Report Shows

Field Effect's 2026 Cyber Threat Outlook reveals that more than 80% of cybersecurity incidents investigated in 2025 stemmed from cloud identity compromise, marking a significant shift in attack strategies. The report shows threat actors are increasingly bypassing traditional exploits by abusing trusted identities and collaboration platforms to gain corporate access.

Identity Compromise Behind 80% of Cyber Incidents in 2025
Cybersecurity5d ago

Identity Compromise Behind 80% of Cyber Incidents in 2025

Field Effect's 2026 Cyber Threat Outlook reveals that more than 80% of cybersecurity incidents investigated in 2025 stemmed from cloud identity compromise, marking a significant shift in attack methods. The report shows attackers are increasingly bypassing traditional exploits by abusing trusted identities and collaboration platforms like Microsoft Teams.

Major Data Breach Affects Multiple Mexican Government Agencies
Cybersecurity27 Feb 2026

Major Data Breach Affects Multiple Mexican Government Agencies

A recent data breach compromised sensitive information from various Mexican government agencies, including SAT, exposing personal data of millions. The incident highlights the growing threat of AI-driven cybercrime.

Analyzing VEN0m Ransomware: Detection, Engineering, and Recovery Insights
Cybersecurity26 Feb 2026

Analyzing VEN0m Ransomware: Detection, Engineering, and Recovery Insights

A recent analysis of VEN0m ransomware reveals its bypass techniques, detection challenges, and the simplicity of key recovery. This report provides a comprehensive overview of attack methodologies and defensive strategies.

Cheyenne and Arapaho Tribes Rebound from Ransomware Attack
Cybersecurity21 Feb 2026

Cheyenne and Arapaho Tribes Rebound from Ransomware Attack

Following a ransomware attack, the Cheyenne and Arapaho Tribes are well into their recovery, emphasizing resilience amid rising cyber threats against tribal governments. Their commitment to cybersecurity is underscored by non-negotiation with attackers.

Gentlemen Ransomware: A High-Velocity RaaS Threat Analysis
Cybersecurity13 Feb 2026

Gentlemen Ransomware: A High-Velocity RaaS Threat Analysis

The Gentlemen ransomware operation has quickly become a formidable force in the cybercrime landscape. This analysis explores its origins, methods, and target profiles, showcasing the evolving world of Ransomware-as-a-Service.