April 9, 2026

US Cybercrime Losses Record: $16.6 Billion Lost in FBI Report

Americans lost more money to cybercrime in 2024 than ever before. The FBI's Internet Crime Complaint Center received over 859,000 complaints last year, with reported losses reaching a record $16.6 billion — a 33% surge from the year before. The US cybercrime losses record reflects not just more attacks, but more damaging ones, with the average victim losing nearly $19,400.

US Cybercrime Losses
April 8, 2026

Who Ran REvil Ransomware? Germany Finally Has Answers

For years, one of the most feared names in cybercrime belonged to no one — at least, no one with a face or a real identity. That changed this week. Germany's Federal Criminal Police Office, the Bundeskriminalamt (BKA), has publicly identified two Russian nationals as the men who ran both GandCrab and REvil ransomware — the criminal operations that extorted

REvil Ransomware
March 10, 2026

KadNap Botnet Turns ASUS Routers into Cybercrime Proxies

Cybersecurity researchers have uncovered a growing KadNap botnet that hijacks ASUS routers and other edge networking devices to power a large proxy network used in cybercrime. The malware quietly infects vulnerable devices and converts them into traffic relays that attackers can rent or use to conceal malicious activity. The campaign demonstrates how home and small-business networking hardware can become valuable

KadNap Botnet
March 6, 2026

Phobos Ransomware Admin Pleads Guilty to Wire Fraud

A key administrator behind the Phobos ransomware operation has pleaded guilty to wire fraud conspiracy in a U.S. federal court. The case marks another major development in international efforts to disrupt ransomware networks responsible for attacks on businesses and public institutions worldwide. Authorities identified Evgenii Ptitsyn, a Russian national, as one of the administrators who helped run the Phobos ransomware

Phobos ransomware
March 5, 2026

HungerRush Extortion Emails Target Restaurant Customers

Restaurant customers across the United States recently received alarming messages tied to HungerRush extortion emails, a campaign that attempted to pressure the restaurant technology provider with threats of data exposure. The attacker distributed mass emails directly to patrons of restaurants using the HungerRush platform, claiming to possess sensitive data and demanding payment. Early reports quickly circulated online as recipients shared

HungerRush extortion emails
March 3, 2026

AWS Data Centers Hit by Drone Strikes

AWS Data Centers in the Middle East sustained physical damage after drone strikes hit facilities in the United Arab Emirates and Bahrain. The incident disrupted cloud services and forced emergency response measures inside critical infrastructure sites. The event highlights a growing reality for global technology providers. Digital services may operate in the cloud, but the infrastructure behind them remains vulnerable

AWS Data Centers
February 24, 2026

Massiv Android Malware Spreads via Fake IPTV Apps

Massiv Android malware has emerged as a new banking threat targeting mobile users through fake IPTV applications. Attackers disguise the malware as a streaming app to trick users into installing it outside official app stores. Once active, it gives criminals deep access to infected devices and allows them to steal sensitive financial data. Security researchers observed the campaign primarily targeting

Massiv Android malware
February 18, 2026

LaLiga Piracy Ruling: Spain Orders VPN IP Blocking

Spain has intensified its crackdown on illegal football streaming through a new LaLiga piracy ruling that shifts enforcement beyond traditional internet service providers. A commercial court has ordered two major VPN companies to restrict access to IP addresses linked to unauthorized LaLiga broadcasts, marking a notable expansion in how copyright protection operates in the digital space. Instead of focusing solely

LaLiga Piracy Ruling
February 13, 2026

Zendesk Spam Wave Returns With Fake Account Activation Emails

A renewed Zendesk spam wave is flooding inboxes worldwide with unsolicited “Activate your account” emails that appear to come from trusted companies. Many recipients never signed up for any service, yet the messages look authentic and often bypass spam filters. The scale and persistence of the campaign have raised concerns among security teams, especially as the emails originate from legitimate

Zendesk spam
February 11, 2026

Signal Account Hijacking Targets Senior German Officials

German authorities have issued a warning after uncovering a targeted Signal account hijacking campaign aimed at senior political, military, and media figures. The attacks do not exploit vulnerabilities in Signal’s encryption or infrastructure. Instead, threat actors rely on social engineering techniques that trick victims into granting account access themselves. Security officials describe the campaign as highly targeted and methodical. The

Signal account hijacking