I found the easiest way to encrypt files on an Android phone - and it's free to do ...
IntroductionIn February 2022, BlackBasta emerged as a successor to Conti ransomware and quickly rose to prominence. BlackBasta was operational for three years until February 2025 when their internal ...
A new Kyber ransomware operation is targeting Windows systems and VMware ESXi endpoints in recent attacks, with one variant ...
A SystemBC proxy malware botnet of more than 1,570 hosts, believed to be corporate victims, has been discovered following an ...
A new Linux GoGra backdoor abuses Outlook via Microsoft Graph API for stealthy C2, targeting telecom, government, and IT sectors.
IntroductionOn March 12, 2026, Zscaler ThreatLabz discovered a malicious ZIP archive containing military-themed document ...
Two newly discovered macOS threats are designed to harvest developer credentials and cloud access as attackers focus on ...
When evolutionary biologist Joseph Popp coded the first documented piece of ransomware in 1989, he had little idea it would ...
Threat actors are abusing external Microsoft Teams collaboration to impersonate IT helpdesk staff and convince users to grant ...
Unsafe defaults in MCP configurations open servers to possible remote code execution, according to security researchers who ...
PowMix targets Czech workforce since Dec 2025 using jittered C2 and ZIP phishing, enabling stealthy remote access and ...