July 4, 2025

IconAds, a Massive Mobile Ad-Fraud Operation Disrupted

A sophisticated mobile ad-fraud operation, named "IconAds," has been disrupted. The dismantling came after it was discovered that 352 Android applications were secretly bombarding users with intrusive ads while hiding their presence on devices. This extensive campaign, which peaked at over 1.2 billion ad bid requests daily, primarily targeted users in Brazil, Mexico, and the United States. How the IconAds

IconAds Operation
July 3, 2025

Hunters International Ransomware Gang Announces Shutdown

The notorious ransomware-as-a-service (RaaS) operation Hunters International has officially announced its closure. They removed its data leak site and offered free decryptors to previous victims. However, cybersecurity experts warn that this may not be the end of the group. It might rather be a strategic rebranding under the new name "World Leaks." Hunters International Calls It Quits In a message

Hunters International Ransomware
July 2, 2025

U.S. Sanctions Aeza Group for Hosting Ransomware Infrastructure

The U.S. Treasury Department has imposed sanctions on Russian internet service provider Aeza Group, accusing the company of knowingly supporting cybercriminal activities by hosting servers used in ransomware and infostealer operations. This move marks a significant escalation in the United States’ ongoing efforts to disrupt the infrastructure that underpins global cybercrime. Aeza Group: A Safe Haven for Cybercriminals Aeza Group,

Aeza Group Sanctioned
July 1, 2025

Fake Zoom Campaign Steals Your Credentials: What To Do?

In a troubling new cybercrime campaign, hackers are deploying fake versions of the popular Zoom video conferencing app to steal sensitive personal data — including login credentials and cryptocurrency wallets. This scheme marks yet another evolution in phishing tactics, with attackers mimicking trusted software to target unsuspecting users. A Familiar App With a Dangerous Twist Security researchers have discovered several

Fake Zoom Campaign Steals Credentials
June 23, 2025

Godfather Malware Is Coming for Your Banking Apps

A new wave of Android-targeting malware is sweeping across devices, and this one is after your money. Called Godfather malware, this powerful banking trojan disguises itself as legitimate apps while quietly hijacking your personal data, banking credentials, and even bypassing two-factor authentication. What Is Godfather Malware? Godfather is an Android banking trojan designed to steal login credentials by impersonating over

Godfather malware
June 21, 2025

Facebook Expands Passkey Support to Fight Phishing Attacks

In a great move towards online scurity Facebook expands passkey support. Meta is doubling down on account security by rolling out broader support for passkeys across Facebook. As phishing attacks continue to threaten online users, this move marks a major step in transitioning toward a passwordless future. What Are Passkeys? Passkeys are a new type of login credential designed to

Facebook Expands Passkeys Support
June 20, 2025

Debunking the 16 Billion Credentials Leak: What Really Happened

In the past week, alarming headlines have circulated across social media and tech news platforms: “16 billion credentials leak in a massive data breach!” The claim quickly sparked fear and speculation, suggesting one of the largest cybersecurity incidents in history. But there’s just one problem: it’s not technically true. Let’s break down what actually happened, why this misleading story went

16 Billion Credentials Leak
June 19, 2025

Chainlink Phishing: Trusted Sites Become Dangerous Gateways

Cybercriminals are using an increasingly deceptive tactic known as chainlink phishing, where they build a chain of seemingly harmless links that ultimately leads to a phishing site. This method allows attackers to bypass security filters, abuse the reputation of major online services, and trick even cautious users into visiting malicious pages. What Is Chainlink Phishing? Chainlink phishing describes a chain

Chainlink Phishing
June 16, 2025

Anubis Ransomware Now Wipes Files Beyond Recovery

A new, far more destructive chapter has begun for the Anubis ransomware operation. Previously known for encrypting data and extorting victims, the cybercriminals behind Anubis have now introduced a wiper feature. One that makes data recovery virtually impossible, even if the ransom is paid. This strategic shift marks a dangerous evolution in the ransomware-as-a-service (RaaS) ecosystem and signals a chilling

Anubis Ransomware
June 14, 2025

Predator Spyware Bounces Back and Finds New Market

When U.S. and EU sanctions hit Intellexa, the company behind the Predator spyware platform, many observers predicted the mercenary‑surveillance market would retreat. Instead, freshly released telemetry from Recorded Future’s Insikt Group shows Predator morphing rather than melting away. Their latest report maps brand‑new command‑and‑control (C2) servers in Mozambique, the first public evidence of a customer there,  plus infrastructure tied to

predator spyware