Qilin Ransomware Rises as Major Threat, Demanding $50M in Ransom
The global cybersecurity landscape is facing a seismic shift as the Qilin ransomware group, also known as Agenda, has surged to the forefront of digital…
The global cybersecurity landscape is facing a seismic shift as the Qilin ransomware group, also known as Agenda, has surged to the forefront of digital…
Cybercriminals no longer need zero-day exploits or other vulnerabilities to breach your systems—these days, they just log in. On July 9th at 2:00 PM ET,…
For many years, cybersecurity professionals have relied on Indicators of Compromise (IOCs) such as IP addresses, domain names, and file hashes to defend against a…
Viasat Inc., a leading U.S. satellite and wireless communications provider, has been identified as the latest victim in a sweeping cyberespionage campaign attributed to the…
ChatGPT’s next big upgrade, or the new foundational model ‘GPT-5,’ is being prepared for public release, but OpenAI won’t share the specifics. In a recent interview,…
Our team stumbled upon a disturbing array of SpyNote spyware samples lurking in open directories across the internet. These misconfigured digital repositories, often overlooked as…
Cybercriminals are finding clever new ways to trick people, even on the official websites of major companies. Malwarebytes Senior Director of Research, Jérôme Segura, has…
The Verizon Data Breach Investigations Report (DBIR) is one of cybersecurity’s most authoritative annual reports. The 2025 DBIR highlights critical trends including rising GenAI-related risks,…
Krispy Kreme Doughnut Corporation has confirmed a significant data breach that exposed the personal information of over 160,000 individuals following a ransomware attack in late…
Toy company Mattel has announced a deal with OpenAI to create AI-powered toys, but digital rights advocates have urged caution. In a press release last…
In a twist of bureaucratic brilliance that Yes, Minister fans will appreciate, the civil service is rolling out a suite of AI tools named –…
4 ways Google uses AI for security, catalog of AWS threat actor techniques, training a custom small language model to find secrets I hope you’ve…