US Cybercrime Losses Record: $16.6 Billion Lost in FBI Report
Americans lost more money to cybercrime in 2024 than ever before. The FBI's Internet Crime Complaint Center received over 859,000 complaints last year, with reported losses reaching a record $16.6 billion — a 33% surge from the year before. The US cybercrime losses record reflects not just more attacks, but more damaging ones, with the average victim losing nearly $19,400.

Who Ran REvil Ransomware? Germany Finally Has Answers
For years, one of the most feared names in cybercrime belonged to no one — at least, no one with a face or a real identity. That changed this week. Germany's Federal Criminal Police Office, the Bundeskriminalamt (BKA), has publicly identified two Russian nationals as the men who ran both GandCrab and REvil ransomware — the criminal operations that extorted

KadNap Botnet Turns ASUS Routers into Cybercrime Proxies
Cybersecurity researchers have uncovered a growing KadNap botnet that hijacks ASUS routers and other edge networking devices to power a large proxy network used in cybercrime. The malware quietly infects vulnerable devices and converts them into traffic relays that attackers can rent or use to conceal malicious activity. The campaign demonstrates how home and small-business networking hardware can become valuable

Phobos Ransomware Admin Pleads Guilty to Wire Fraud
A key administrator behind the Phobos ransomware operation has pleaded guilty to wire fraud conspiracy in a U.S. federal court. The case marks another major development in international efforts to disrupt ransomware networks responsible for attacks on businesses and public institutions worldwide. Authorities identified Evgenii Ptitsyn, a Russian national, as one of the administrators who helped run the Phobos ransomware

HungerRush Extortion Emails Target Restaurant Customers
Restaurant customers across the United States recently received alarming messages tied to HungerRush extortion emails, a campaign that attempted to pressure the restaurant technology provider with threats of data exposure. The attacker distributed mass emails directly to patrons of restaurants using the HungerRush platform, claiming to possess sensitive data and demanding payment. Early reports quickly circulated online as recipients shared

AWS Data Centers Hit by Drone Strikes
AWS Data Centers in the Middle East sustained physical damage after drone strikes hit facilities in the United Arab Emirates and Bahrain. The incident disrupted cloud services and forced emergency response measures inside critical infrastructure sites. The event highlights a growing reality for global technology providers. Digital services may operate in the cloud, but the infrastructure behind them remains vulnerable

Massiv Android Malware Spreads via Fake IPTV Apps
Massiv Android malware has emerged as a new banking threat targeting mobile users through fake IPTV applications. Attackers disguise the malware as a streaming app to trick users into installing it outside official app stores. Once active, it gives criminals deep access to infected devices and allows them to steal sensitive financial data. Security researchers observed the campaign primarily targeting

LaLiga Piracy Ruling: Spain Orders VPN IP Blocking
Spain has intensified its crackdown on illegal football streaming through a new LaLiga piracy ruling that shifts enforcement beyond traditional internet service providers. A commercial court has ordered two major VPN companies to restrict access to IP addresses linked to unauthorized LaLiga broadcasts, marking a notable expansion in how copyright protection operates in the digital space. Instead of focusing solely

Zendesk Spam Wave Returns With Fake Account Activation Emails
A renewed Zendesk spam wave is flooding inboxes worldwide with unsolicited “Activate your account” emails that appear to come from trusted companies. Many recipients never signed up for any service, yet the messages look authentic and often bypass spam filters. The scale and persistence of the campaign have raised concerns among security teams, especially as the emails originate from legitimate

Signal Account Hijacking Targets Senior German Officials
German authorities have issued a warning after uncovering a targeted Signal account hijacking campaign aimed at senior political, military, and media figures. The attacks do not exploit vulnerabilities in Signal’s encryption or infrastructure. Instead, threat actors rely on social engineering techniques that trick victims into granting account access themselves. Security officials describe the campaign as highly targeted and methodical. The
