Who Ran REvil Ransomware? Germany Finally Has Answers
For years, one of the most feared names in cybercrime belonged to no one — at least, no one with a face or a real identity. That changed this week. Germany's Federal Criminal Police Office, the Bundeskriminalamt (BKA), has publicly identified two Russian nationals as the men who ran both GandCrab and REvil ransomware — the criminal operations that extorted

Drift Protocol Hack: North Korea’s $280M Long Con
The Drift Protocol hack stands as one of the most elaborate cryptocurrency thefts ever recorded. Attackers did not find a bug, write an exploit, and strike overnight. They spent six months building relationships, attending conferences, depositing real money, and embedding themselves inside a live trading platform before making their move. What Is Drift Protocol? Drift Protocol is a decentralized trading

Fake Claude Code Repos on GitHub Are Spreading Malware
Anthropic's accidental leak of the Claude Code source code on March 31 set off a frenzy of downloads across GitHub. Developers, researchers, and the simply curious all rushed to grab the exposed files. Criminals saw that rush and moved fast. Within 24 hours, fake GitHub repositories carrying Claude Code malware were live — and actively appearing in Google search results

NoVoice Malware Hits 2.3 Million Android Devices via Google Play
A new Android rootkit campaign called NoVoice malware has been discovered hiding inside more than 50 apps on Google Play. The apps collected at least 2.3 million downloads before being removed. Researchers warn that millions of devices may still be compromised. What Is NoVoice Malware? NoVoice malware is a rootkit. That means it burrows into the deepest layers of a

CrystalX RAT: The Malware That Spies, Steals, and Trolls You
A new piece of Windows malware is turning heads in the cybersecurity world. CrystalX RAT is a remote access Trojan discovered in early 2026. It combines spyware, credential theft, and cryptocurrency hijacking with "prankware" features. These features flip your screen, scramble your mouse buttons, and lock your keyboard, all while quietly draining your data in the background. What Is CrystalX

CareCloud Data Breach Exposes Patient Health Records
Healthcare IT firm CareCloud has confirmed a data breach that gave attackers unauthorized access to one of its electronic health record systems for roughly eight hours. The New Jersey-based company disclosed the incident to the U.S. Securities and Exchange Commission on March 24, more than a week after the intrusion on March 16. Patient health records were stored in the

Ajax Data Breach Exposes Fans and Ticket Data
Dutch football club AFC Ajax Amsterdam has confirmed an Ajax data breach that exposed fan records and left tens of thousands of season tickets vulnerable to theft. The club learned about the security failure not from its own systems, but from a journalist tipped off by the hacker. The breach has raised serious questions about how sports organizations handle fan

AnimePlay Shutdown: 5 Million Users, 60TB of Stolen Anime
The AnimePlay shutdown is one of the most significant anti-piracy actions to hit the anime streaming world in years. A global entertainment coalition dismantled the app on March 27, 2026, taking offline a platform that had quietly grown into one of the largest illegal anime services in the Asia-Pacific region, with over five million registered users and tens of terabytes

Bubble AI Exploited in Microsoft Credential Phishing
Phishers have found a new way to slip past email security filters, and it involves a tool most people associate with building legitimate apps. Attackers are now abusing Bubble AI, a no-code app-building platform, to create and host malicious web apps designed to steal Microsoft account credentials. The approach is convincing, hard to detect, and security researchers warn it is

Torg Grabber Malware Targets 728 Crypto Wallets
A newly discovered infostealer has sent shockwaves through the cybersecurity community. Torg Grabber malware, identified by researchers at Gen Digital, targets 728 cryptocurrency wallet browser extensions, along with hundreds of password managers, two-factor authentication tools, and note-taking apps. It spreads through social engineering, moves fast, and goes after virtually every digital asset a victim might have. This is not a
