Cyber Security News
Malicious VS Code Extensions Target Developers with ShibaCoin Ransomware
Researchers from Reversing Labs have identified two malicious Visual Studio Code (VS Code) extensions that are distributing ransomware to unsuspecting developers.The extensions, named "ahban.shiba" and "ahban.cychelloworld," are currently under...
cyber security
Albabat Ransomware Expands Reach to Target Linux and macOS Platforms
A recent report from Trend Micro has revealed that a new variant of the Albabat ransomware now targets Linux and macOS platforms, marking a...
cyber security
VanHelsingRaaS Emerges, Targeting Linux, BSD, ARM, and ESXi Systems
VanHelsingRaaS, a newly launched ransomware-as-a-service (RaaS) program, has quickly gained traction in the cybercrime ecosystem.Introduced on March 7, 2025, this RaaS platform offers...
cyber security
MEDUSA Ransomware Deploys Malicious ABYSSWORKER Driver to Disable EDR
In a recent analysis by Elastic Security Labs, a malicious driver known as ABYSSWORKER has been identified as a key component in the MEDUSA...
cyber security
VanHelsing Ransomware Targets Windows Systems with New Evasion Tactics and File Extension
The cybersecurity landscape has been recently disrupted by the emergence of the VanHelsing ransomware, a sophisticated strain identified by the CYFIRMA Research and Advisory...
cyber security
RansomHub Affiliate Deploys New Custom Backdoor “Betruger” for Persistent Access
Symantec's Threat Hunter team has identified a sophisticated custom backdoor named "Betruger" linked to a RansomHub affiliate.This newly discovered backdoor appears to be...
cyber security
Dragon RaaS Leading “Five Families” Crimeware with New Initial Access & Exploitation Tactics
Dragon RaaS, a ransomware group known for its blend of hacktivism and cybercrime, has emerged as a significant player in the "Five Families" crimeware...
cyber security
Babuk2 Ransomware Issues Fake Extortion Demands Using Data from Old Breaches
Recent investigations by the Halcyon RISE Team have uncovered a concerning trend in the ransomware landscape: the Babuk2 group is issuing extortion demands based...
cyber security
Hackers Use RMM Tools to Maintain Persistence and Navigate Networks Undetected
Threat actors have increasingly been leveraging legitimate remote monitoring and management (RMM) software to infiltrate and navigate through networks undetected.RMM tools, such as...
cyber security
Threat Actors Steal 3.2 Billion Login Credentials and Infect 23 Million Devices Worldwide
In a stark revelation of the escalating cyber threat landscape, Flashpoint's latest intelligence report highlights the alarming rise in compromised credentials and malware infections.In...
cyber security
SocGholish Exploits Compromised Websites to Deliver RansomHub Ransomware
SocGholish, a sophisticated malware-as-a-service (MaaS) framework, has been identified as a key enabler in the distribution of RansomHub ransomware.This malicious framework exploits compromised...