September 1, 2025

TamperedChef Infostealer Hides in Fake PDF Editing App

The TamperedChef infostealer has emerged as a serious threat, hiding inside a fraudulent PDF editor promoted through Google Ads. This deceptive campaign tricked users into downloading an app that appeared legitimate, only to later activate malicious features. With delayed activation and credential theft, the campaign shows how cybercriminals continue to evolve their tactics. Malvertising and the Fake PDF Tool Attackers

TamperedChef infostealer
August 31, 2025

Experimental PromptLock Ransomware Uses AI for Encryption and Data Theft

The PromptLock ransomware is an experimental prototype that demonstrates how artificial intelligence can be weaponized in cybercrime. Unlike traditional strains, this proof-of-concept leverages generative AI to encrypt files and exfiltrate data, making it a potential game-changer in ransomware evolution. Researchers warn that while it has not yet appeared in live attacks, PromptLock highlights the dangers of AI-driven malware. How PromptLock

PromptLock Ransomware
August 30, 2025

Claude AI Ransomware Abuse Sparks Cybersecurity Concerns

Claude AI ransomware abuse has raised new concerns about artificial intelligence in cybercrime. Recent reports show that threat actors are misusing Anthropic’s Claude models to create advanced ransomware campaigns. These cases highlight how AI can lower barriers for cybercriminals and accelerate the spread of Ransomware-as-a-Service. Cybercriminals Turn Claude Into a Weapon Investigators discovered that a threat actor identified as GTG-5004

Claude AI ransomware abuse
August 29, 2025

Storm-0501 Ransomware Shifts to Cloud Attacks

Storm-0501 ransomware has entered a new phase. Security researchers report that the group has moved from on-premise intrusions to cloud-based attacks. By exploiting Azure environments, Storm-0501 has found ways to exfiltrate data, destroy backups, and pressure victims into ransom payments. This marks a major shift in how ransomware groups adapt to cloud reliance. How Storm-0501 Operates The ransomware group does

Storm-0501
August 28, 2025

Hook Android Trojan Ransomware Attacks Spread via GitHub

The Hook Android Trojan ransomware attacks mark the latest stage in the malware’s evolution. Once known mainly as a banking trojan, Hook has now gained powerful ransomware-style features, giving cybercriminals new tools to exploit Android users. What Makes the New Hook Variant Dangerous The latest version, often called Hook v3, shows how mobile malware continues to expand its reach: Ransomware-style

Hook Android Trojan
August 27, 2025

Silk Typhoon Hackers Use Fake Portals in Espionage Campaigns

Silk Typhoon hackers hijack captive portals in diplomat attacks, exposing how far advanced persistent threats will go to steal intelligence. The group, also tracked as Mustang Panda, UNC6384, and TEMP.Hex, is a known Chinese state-sponsored operation. Their latest campaign reveals new tactics designed to bypass defenses and target high-value diplomatic missions. Hijacking Captive Portals Captive portals usually appear when users

Silk Typhoon Hackers
August 26, 2025

Interpol Operation Serengeti Targets Cybercrime Across Africa

Interpol Operation Serengeti has reshaped the fight against cybercrime in Africa. The international crackdown, carried out between June and August 2025, united law enforcement agencies from 18 African nations with support from the United Kingdom. The campaign led to the arrest of more than a thousand suspects, the recovery of tens of millions in stolen funds, and the dismantling of

Interpol Operation Serengeti
August 25, 2025

Murky Panda Hackers Exploit Cloud Trust to Breach Customers

Murky Panda Hackers, a Chinese state-linked group, have escalated their espionage campaign by targeting cloud providers. Security researchers report that the attackers exploit cloud trust relationships to infiltrate downstream customer environments. This tactic grants them privileged access to sensitive data across multiple organizations. How the Attacks Work The group compromised SaaS providers by stealing application registration secrets in Microsoft Entra

Murky Panda Hackers
August 24, 2025

GPT-6 Release: OpenAI Teases Faster Launch and Major Upgrades

The GPT-6 release is already making headlines. OpenAI CEO Sam Altman confirmed that work has started on the new model. He also suggested the wait will be shorter compared to GPT-5’s rollout. Following a rocky launch of GPT-5, OpenAI now aims to deliver a smoother and more advanced upgrade. What We Know So Far Altman admitted that GPT-5’s launch faced

Gpt-6 release
August 23, 2025

Qilin Ransomware: Europol Confirms Fake $50K Reward

Qilin Ransomware has been linked to devastating attacks worldwide, but its latest headline came from a false claim. A Telegram channel announced a $50,000 Europol reward for details on Qilin leaders. The message quickly spread across security circles before Europol confirmed it was a scam. The agency clarified it never offered such a bounty and does not use Telegram for

Qilin Ransomware