JanaWare ransomware targets Turkish users through a customized Adwind RAT chain
A new ransomware operation called JanaWare is targeting users in Turkey through a tailored version of the Adwind remote access trojan. Acronis Threat Research Unit…
Here you can find the latest news and developments in the VPN world. Read about new breakthroughs, bypassing online censorship, and much more!
A new ransomware operation called JanaWare is targeting users in Turkey through a tailored version of the Adwind remote access trojan. Acronis Threat Research Unit…
Microsoft has patched a Windows BitLocker vulnerability that could let a local attacker bypass a security feature on a vulnerable machine. The flaw, tracked as…
Triad Nexus, a cybercrime network linked to the FUNNULL ecosystem, has rebuilt part of its fraud infrastructure after U.S. sanctions and now uses more than…
Agentic AI browsers can turn a single malicious webpage into something much more dangerous than a normal browser exploit. Varonis Threat Labs says these browsers…
Attackers who break into Microsoft 365 accounts are increasingly using mailbox rules to spy on email, hide warnings, and forward sensitive messages outside the company.…
A supply chain attack hit the WordPress plugin ecosystem after a buyer acquired a portfolio of widely used plugins and slipped in malicious code that…
Threat actors are using Google Cloud Storage URLs to host fake Google Drive pages, steal login details, and then deliver Remcos RAT to Windows systems.…
A new cyber campaign with tactics that resemble MuddyWater scanned more than 12,000 internet-facing systems before moving into targeted attacks against critical organizations in the…
Anthropic’s Claude did suffer a real disruption on April 13, 2026, but the public record does not support the claim that the company left its…
Rockstar Games has confirmed a third-party data breach after the hacking group ShinyHunters claimed it accessed the company’s Snowflake data through analytics vendor Anodot. Rockstar…
A new malware campaign is using a fake Proxifier installer hosted through GitHub to infect users with ClipBanker, a clipboard-hijacking trojan built to steal cryptocurrency.…
A newly exposed campaign shows how dangerous malicious browser extensions can become when attackers run them like a centralized service. Security firm Socket says it…
The FBI and Indonesian authorities say they have dismantled the infrastructure behind the W3LL phishing kit, a phishing-as-a-service operation tied to large-scale credential theft and…
APT41 is expanding its Linux toolset again, this time with a backdoor built for cloud workloads. Recent reporting says the group deployed a new Winnti-family…
Booking.com has confirmed a data breach that exposed some customers’ reservation information, and the biggest immediate risk now looks like targeted phishing. The company said…