Threats

147 articles

Threats

Belarus-Linked Hackers Target Ukraine Officials

A Belarus-linked hacking group, GhostWriter, has launched a phishing campaign against Ukrainian government officials using fake emails disguised as messages from an online learning platform to deliver malware.

Threats

Kimwolf Botnet Alleged Leader Arrested

Jacob Butler, a 23-year-old Canadian man, was arrested for allegedly running the Kimwolf botnet, which initiated over 25,000 DDoS attacks and caused millions of dollars in financial losses.

Threats

Crypto Drainers: How They Work

Crypto drainers are tools designed to steal cryptocurrency assets by abusing wallet permissions and transaction approvals, often through social engineering tactics.

Threats

Tech Support Scam Assistants Plead Guilty

Two Americans, Adam Young and Harrison Gevirtz, pleaded guilty to assisting India-based tech support scam centers that stole millions from US citizens.

Threats

ICS Security Threats

Experts share real-world experiences of ICS security threats, highlighting the gap between written security policies and actual plant floor practices.

Threats

AI-Powered App Attacks Increase

AI-powered app attacks are becoming faster, more frequent, and harder to stop, with 87% of monitored apps under attack in 2026.

Threats

Crypto ATM Scams

US residents lost $388 million through cryptocurrency kiosks in 2025, with Texas and Florida reporting the highest losses, according to a new FBI report.

Threats

Microsoft Disrupts Fox Tempest Cybercrime Service

Microsoft seized infrastructure and disrupted a cybercrime service that created and sold over 1,000 code-signing certificates used to make malware appear trusted and legitimate.

Threats

Tycoon2FA Device Code Phishing

The Tycoon2FA phishing kit has added device-code phishing attacks to hijack Microsoft 365 accounts, with a surge in such attacks reported by Push Security and Proofpoint.

Threats

Foxconn Cyberattack

Foxconn, a major electronics manufacturer, is recovering from a cyberattack that disrupted its North American factories, with the Nitrogen ransomware group claiming responsibility and stealing 8 terabytes of data.

Threats

Shai-Hulud Worm Source Code Released

TeamPCP has released the source code of its Shai-Hulud worm, potentially fueling more supply chain attacks and copycat threats.

Threats

AI-Powered Identity Security Threats

A top White House cybersecurity official emphasizes the importance of regulating and monitoring identities accessing federal networks as AI integration increases.

Threats

Cyber-Enabled Cargo Crime

Cybercrime tradecraft is being used to steal freight, with entire truckloads of goods being re-routed and sold on the black market, resulting in approximately $725 million in cargo crime losses across North America in 2025.

Threats

US Intelligence Community Prepares for Foreign Election Threats

The US intelligence community has begun ramping up efforts to shield the upcoming midterms from foreign manipulation, with Director of National Intelligence Tulsi Gabbard tapping two officials to coordinate the response.

Threats

Data Center Security Enhanced

Data centers can enhance security without sacrificing performance by utilizing data processing units (DPUs) to execute security workloads, freeing CPU and GPU cycles for their intended operations.

Threats

Mythos AI Model Raises Cyber Risks Concerns

The House Homeland Security Committee is investigating Anthropic's AI model Mythos, which can autonomously uncover cyber vulnerabilities, amid concerns over its use by federal agencies.

Threats

AI-Generated Fraud: The New Frontier

Fraudsters are using generative AI to automate impersonation and mass-produce synthetic identities, rendering enterprises' defenses obsolete, with predicted losses reaching $40 billion in the U.S. by 2027.

Threats

Dream Market Admin Arrested

German and US authorities arrested Owe Martin Andresen, 49, alleged administrator of Dream Market, on multiple charges of money laundering after a May 7 raid on three locations.

Threats

Ransomware Attack Impacts West Pharmaceutical Operations

West Pharmaceutical Services has reported a ransomware attack that has impacted critical systems used to ship, receive and manufacture products, temporarily disrupting business operations globally.

Threats

Cybersecurity Leadership for Small Businesses

The average cyberattack costs a small- or medium-size business over $250,000, highlighting the need for affordable cybersecurity leadership solutions.

Threats

Operation HookedWing Phishing Campaign

Over 500 organizations across multiple industries have been targeted in a years-long phishing campaign, resulting in the theft of more than 2,000 user credentials.

Threats

Pro-Ukraine Hacktivists Unite Against Russia

Pro-Ukraine hacktivist groups BO Team and Head Mare appear to be coordinating cyber operations against Russian organizations, according to a Kaspersky report.

Threats

Virginia Man Guilty of Deleting Government Databases

Sohaib Akhter, 34, was found guilty of conspiracy to commit computer fraud and other charges after deleting 96 government databases and stealing an individual's password.

Threats

Canvas System Cyberattack

A cyberattack on the Canvas system used by thousands of schools has left students and faculty unable to access course materials, creating chaos as finals approach.

Threats

Schumer Calls for AI Cyber Coordination

Senate Minority Leader Chuck Schumer is seeking a plan from the Department of Homeland Security to coordinate with state and local governments on defending against AI-strengthened hacks.

Threats

Canvas Cyber Incident

A cyberattack on education software provider Instructure forced multiple universities to reschedule final exams, with hackers from the ShinyHunters group demanding a ransom by May 12.

Threats

Iranian Government Hackers Utilize Chaos Ransomware

Iranian government hackers are using Chaos ransomware as a cover for alleged espionage and data theft operations, according to researchers from Rapid7.

Threats

North Korean IT Worker Scheme Facilitators Sentenced

Two US nationals were sentenced to 18 months in prison for running laptop farms that facilitated North Korea's remote IT workers scheme, generating $1.2 million in revenue for the regime.

Threats

CVE: GoDaddy ManageWP Phishing

A phishing campaign is targeting ManageWP credentials through Google sponsored search results, with 200 unique victims confirmed so far.

Threats

Ransomware Attacks Succeed Despite Backups

Ransomware attacks often succeed even when backups exist, as attackers target and destroy backup systems before launching encryption, making recovery impossible.

Threats

CISA Urges Critical Infrastructure to Prepare for Isolation

CISA is urging critical infrastructure owners to plan for delivering essential services under emergency conditions, potentially for months, due to threats from state-sponsored hackers.

Threats

Conti Ransomware Affiliate Sentenced to 8 Years

A Latvian ransomware affiliate has been sentenced to over 8 years in prison for conducting attacks on behalf of Conti and Akira, causing $56 million in losses.

Threats

Amazon SES Phishing Abuse

The Amazon Simple Email Service is being increasingly abused to send convincing phishing emails that bypass standard security filters and render reputation-based blocks ineffective.

Threats

Fraudsters Target Credit Unions

Fraudsters are increasingly targeting small to mid-sized credit unions with structured loan fraud methods, exploiting weaknesses in work processes and verification systems.

Threats

Data Center Security

Lawmakers and industry experts are considering whether the federal government has the right setup to defend data centers from cyber and physical attacks.

Threats

Cordial Spider and Snarky Spider Extortion Attacks

Cordial Spider and Snarky Spider, two financially-motivated threat groups, are targeting US-based organizations in multiple sectors for rapid data theft and extortion attacks, using voice-phishing and social engineering tactics.

Threats

Telegram Crypto Scams

Cybersecurity researchers uncovered a large-scale fraud operation using Telegram's Mini App feature to run crypto scams and distribute Android malware.

Threats

HeartlessSoul Cyber Spies Target Russian Aviation

A cyber-espionage group known as HeartlessSoul has been targeting Russian government agencies and companies in the aviation industry to steal sensitive geospatial data.

Threats

FCC Tightens Telecom Security

The FCC has approved new regulations to strengthen telecom companies' 'Know Your Customer' requirements and protect networks from cyberattacks.

Threats

Ransomware Attackers Sentenced to 4 Years

Two cybersecurity incident responders were sentenced to four years in prison for conducting covert ransomware attacks, earning $1.2 million from one incident.

Threats

Ransomware Attackers Sentenced

Two former cybersecurity professionals, Ryan Goldberg and Kevin Martin, were sentenced to four years in prison for committing ransomware attacks in 2023.

Threats

Bitwarden CLI NPM Package Poisoned in Sophisticated Supply Chain Attack

Version 2026.4.0 of the Bitwarden CLI NPM package was found to contain malicious code capable of stealing credentials and secrets from victim machines, with links to recent attacks on Checkmarx and the Shai-Hulud worm campaigns.

Threats

North Korea's Lazarus Group Suspected in $290M KelpDAO Crypto Theft

State-sponsored North Korean hackers from the Lazarus Group are believed to be behind a $290 million heist targeting the KelpDAO DeFi protocol, with attackers manipulating cross-chain verification nodes to authorize fraudulent transactions.

Threats

Two US Nationals Sentenced for Running North Korean IT Worker Laptop Farms

Kejia Wang and Zhenxing Wang, both New Jersey residents, have been sentenced to prison for facilitating a North Korean IT worker fraud scheme that generated over $5 million for Pyongyang and caused more than $3 million in losses to US companies.

Threats

Tycoon 2FA Dethroned as PhaaS Leader Following Domain Seizures and Ecosystem Shift

Cybersecurity firm Barracuda Networks reports that Tycoon 2FA has lost its dominance among phishing-as-a-service platforms after law enforcement seized 330 of its domains, with threat actors migrating to rivals like Mamba 2FA and EvilProxy while total attacks surged past 23 million.

Threats

Synnovis Ransomware Attack Still Haunting London NHS Trusts 18 Months On

More than 18 months after the Qilin ransomware group struck Synnovis in June 2024, at least one London NHS trust is still running on paper processes, with over 161,000 pathology reports delayed and one patient death linked to the incident.

Threats

Kimwolf Botnet Accidentally Cripples I2P Anonymity Network in Sybil Attack

The Kimwolf IoT botnet has been hammering the I2P anonymity network since early February 2026 after its operators attempted to enroll 700,000 infected devices as network nodes, overwhelming the system and cutting connectivity roughly in half.

Threats

Starkiller Phishing-as-a-Service Bypasses MFA by Proxying Real Login Pages

A new phishing-as-a-service platform called Starkiller dynamically loads authentic login pages through a reverse proxy, capturing credentials and MFA tokens in real time while rendering traditional detection methods largely ineffective.

Threats

Unmasking Kimwolf's Botmaster: The Trail Leading to 'Dort'

Open-source intelligence and breach data link Kimwolf botnet operator 'Dort' to Jacob Butler, an Ottawa, Canada resident born in August 2003, who has since orchestrated DDoS attacks, doxing, and a swatting incident against those who exposed the botnet.

Threats

Why Hospital Ransomware Defense Starts With Realistic Rehearsals

A chief medical information officer at San Joaquin General Hospital told RSAC 2026 attendees that preparation and repeated rehearsal—not just downtime playbooks—are what truly determine whether a ransomware attack on a healthcare facility escalates or stabilizes.

Threats

Fancy Bear's Relentless Global Campaign: What Defenders Need to Know

Trend Micro research and a fresh FBI warning reveal that Russia's APT28 is targeting governments, defense contractors, and critical infrastructure worldwide using both old and new techniques. Experts say defenders don't need to match the group's sophistication — they just need to get the basics right.

Threats

Dutch Healthcare Software Firm ChipSoft Crippled by Ransomware Attack

Dutch EHR vendor ChipSoft has been struck by a ransomware attack, forcing the company to take its website and patient-facing digital services offline and prompting warnings to connected hospitals across the Netherlands and Belgium.

Threats

Censys Finds 3,900 US Devices Exposed to Iranian OT Attack Campaign

Researchers at Censys have identified more than 5,200 internet-exposed Rockwell Automation/Allen-Bradley PLCs potentially vulnerable to Iranian state-backed attackers, with nearly 3,900 of those devices located in the United States.

Threats

Ransomware Strike on ChipSoft Ripples Across Dutch Hospital Networks

A ransomware attack on Dutch healthcare software vendor ChipSoft on April 7 forced the company to disable key digital platforms used by roughly 70% of Netherlands hospitals, triggering widespread logistical disruptions.

Threats

CPUID Supply Chain Attack Poisons CPU-Z and HWMonitor Download Links

Hackers compromised a secondary API on the CPUID website for roughly six hours, redirecting download links for CPU-Z and HWMonitor to trojanized malware. The breach was discovered and remediated, but users who downloaded either tool during that window may be infected.

Threats

The Ransomware Landscape in 2026: What Has Changed

Ransomware continues to evolve at an alarming pace. From AI-powered attack chains to the decline of ransom payments, we examine the trends reshaping the threat landscape in 2026.

Threats

Supply Chain Attacks: The Growing Threat to Software Security

Supply chain attacks have surged dramatically, targeting the trust relationships between software vendors, open-source ecosystems, and end users. We examine the evolving threat landscape and strategies for defense.

Threats

IoT Botnet Activity Surges as Millions of Devices Remain Unpatched

A new wave of IoT botnet activity is exploiting millions of unpatched smart devices worldwide. Security researchers are tracking multiple Mirai variants and novel malware families targeting everything from home routers to industrial sensors.