IconAds, a Massive Mobile Ad-Fraud Operation Disrupted
A sophisticated mobile ad-fraud operation, named "IconAds," has been disrupted. The dismantling came after it was discovered that 352 Android applications were secretly bombarding users with intrusive ads while hiding their presence on devices. This extensive campaign, which peaked at over 1.2 billion ad bid requests daily, primarily targeted users in Brazil, Mexico, and the United States. How the IconAds
Hunters International Ransomware Gang Announces Shutdown
The notorious ransomware-as-a-service (RaaS) operation Hunters International has officially announced its closure. They removed its data leak site and offered free decryptors to previous victims. However, cybersecurity experts warn that this may not be the end of the group. It might rather be a strategic rebranding under the new name "World Leaks." Hunters International Calls It Quits In a message

U.S. Sanctions Aeza Group for Hosting Ransomware Infrastructure
The U.S. Treasury Department has imposed sanctions on Russian internet service provider Aeza Group, accusing the company of knowingly supporting cybercriminal activities by hosting servers used in ransomware and infostealer operations. This move marks a significant escalation in the United States’ ongoing efforts to disrupt the infrastructure that underpins global cybercrime. Aeza Group: A Safe Haven for Cybercriminals Aeza Group,

Fake Zoom Campaign Steals Your Credentials: What To Do?
In a troubling new cybercrime campaign, hackers are deploying fake versions of the popular Zoom video conferencing app to steal sensitive personal data — including login credentials and cryptocurrency wallets. This scheme marks yet another evolution in phishing tactics, with attackers mimicking trusted software to target unsuspecting users. A Familiar App With a Dangerous Twist Security researchers have discovered several

Godfather Malware Is Coming for Your Banking Apps
A new wave of Android-targeting malware is sweeping across devices, and this one is after your money. Called Godfather malware, this powerful banking trojan disguises itself as legitimate apps while quietly hijacking your personal data, banking credentials, and even bypassing two-factor authentication. What Is Godfather Malware? Godfather is an Android banking trojan designed to steal login credentials by impersonating over

Facebook Expands Passkey Support to Fight Phishing Attacks
In a great move towards online scurity Facebook expands passkey support. Meta is doubling down on account security by rolling out broader support for passkeys across Facebook. As phishing attacks continue to threaten online users, this move marks a major step in transitioning toward a passwordless future. What Are Passkeys? Passkeys are a new type of login credential designed to

Debunking the 16 Billion Credentials Leak: What Really Happened
In the past week, alarming headlines have circulated across social media and tech news platforms: “16 billion credentials leak in a massive data breach!” The claim quickly sparked fear and speculation, suggesting one of the largest cybersecurity incidents in history. But there’s just one problem: it’s not technically true. Let’s break down what actually happened, why this misleading story went

Chainlink Phishing: Trusted Sites Become Dangerous Gateways
Cybercriminals are using an increasingly deceptive tactic known as chainlink phishing, where they build a chain of seemingly harmless links that ultimately leads to a phishing site. This method allows attackers to bypass security filters, abuse the reputation of major online services, and trick even cautious users into visiting malicious pages. What Is Chainlink Phishing? Chainlink phishing describes a chain

Anubis Ransomware Now Wipes Files Beyond Recovery
A new, far more destructive chapter has begun for the Anubis ransomware operation. Previously known for encrypting data and extorting victims, the cybercriminals behind Anubis have now introduced a wiper feature. One that makes data recovery virtually impossible, even if the ransom is paid. This strategic shift marks a dangerous evolution in the ransomware-as-a-service (RaaS) ecosystem and signals a chilling

Predator Spyware Bounces Back and Finds New Market
When U.S. and EU sanctions hit Intellexa, the company behind the Predator spyware platform, many observers predicted the mercenary‑surveillance market would retreat. Instead, freshly released telemetry from Recorded Future’s Insikt Group shows Predator morphing rather than melting away. Their latest report maps brand‑new command‑and‑control (C2) servers in Mozambique, the first public evidence of a customer there, plus infrastructure tied to
