TamperedChef Infostealer Hides in Fake PDF Editing App
The TamperedChef infostealer has emerged as a serious threat, hiding inside a fraudulent PDF editor promoted through Google Ads. This deceptive campaign tricked users into downloading an app that appeared legitimate, only to later activate malicious features. With delayed activation and credential theft, the campaign shows how cybercriminals continue to evolve their tactics. Malvertising and the Fake PDF Tool Attackers

Experimental PromptLock Ransomware Uses AI for Encryption and Data Theft
The PromptLock ransomware is an experimental prototype that demonstrates how artificial intelligence can be weaponized in cybercrime. Unlike traditional strains, this proof-of-concept leverages generative AI to encrypt files and exfiltrate data, making it a potential game-changer in ransomware evolution. Researchers warn that while it has not yet appeared in live attacks, PromptLock highlights the dangers of AI-driven malware. How PromptLock

Claude AI Ransomware Abuse Sparks Cybersecurity Concerns
Claude AI ransomware abuse has raised new concerns about artificial intelligence in cybercrime. Recent reports show that threat actors are misusing Anthropic’s Claude models to create advanced ransomware campaigns. These cases highlight how AI can lower barriers for cybercriminals and accelerate the spread of Ransomware-as-a-Service. Cybercriminals Turn Claude Into a Weapon Investigators discovered that a threat actor identified as GTG-5004

Storm-0501 Ransomware Shifts to Cloud Attacks
Storm-0501 ransomware has entered a new phase. Security researchers report that the group has moved from on-premise intrusions to cloud-based attacks. By exploiting Azure environments, Storm-0501 has found ways to exfiltrate data, destroy backups, and pressure victims into ransom payments. This marks a major shift in how ransomware groups adapt to cloud reliance. How Storm-0501 Operates The ransomware group does

Hook Android Trojan Ransomware Attacks Spread via GitHub
The Hook Android Trojan ransomware attacks mark the latest stage in the malware’s evolution. Once known mainly as a banking trojan, Hook has now gained powerful ransomware-style features, giving cybercriminals new tools to exploit Android users. What Makes the New Hook Variant Dangerous The latest version, often called Hook v3, shows how mobile malware continues to expand its reach: Ransomware-style

Silk Typhoon Hackers Use Fake Portals in Espionage Campaigns
Silk Typhoon hackers hijack captive portals in diplomat attacks, exposing how far advanced persistent threats will go to steal intelligence. The group, also tracked as Mustang Panda, UNC6384, and TEMP.Hex, is a known Chinese state-sponsored operation. Their latest campaign reveals new tactics designed to bypass defenses and target high-value diplomatic missions. Hijacking Captive Portals Captive portals usually appear when users

Interpol Operation Serengeti Targets Cybercrime Across Africa
Interpol Operation Serengeti has reshaped the fight against cybercrime in Africa. The international crackdown, carried out between June and August 2025, united law enforcement agencies from 18 African nations with support from the United Kingdom. The campaign led to the arrest of more than a thousand suspects, the recovery of tens of millions in stolen funds, and the dismantling of

Murky Panda Hackers Exploit Cloud Trust to Breach Customers
Murky Panda Hackers, a Chinese state-linked group, have escalated their espionage campaign by targeting cloud providers. Security researchers report that the attackers exploit cloud trust relationships to infiltrate downstream customer environments. This tactic grants them privileged access to sensitive data across multiple organizations. How the Attacks Work The group compromised SaaS providers by stealing application registration secrets in Microsoft Entra

GPT-6 Release: OpenAI Teases Faster Launch and Major Upgrades
The GPT-6 release is already making headlines. OpenAI CEO Sam Altman confirmed that work has started on the new model. He also suggested the wait will be shorter compared to GPT-5’s rollout. Following a rocky launch of GPT-5, OpenAI now aims to deliver a smoother and more advanced upgrade. What We Know So Far Altman admitted that GPT-5’s launch faced

Qilin Ransomware: Europol Confirms Fake $50K Reward
Qilin Ransomware has been linked to devastating attacks worldwide, but its latest headline came from a false claim. A Telegram channel announced a $50,000 Europol reward for details on Qilin leaders. The message quickly spread across security circles before Europol confirmed it was a scam. The agency clarified it never offered such a bounty and does not use Telegram for
