February 24, 2025 | Cybernews Summaries
A significant leak of internal communications from the BlackBasta ransomware gang reveals their strategies, internal conflicts, and operations, including details on key members and various exploits used in their attacks.
February 21, 2025 | Cybernews Summaries
The DeceptiveDevelopment malware campaign, linked to North Korean cybercriminals, exploits freelance software developers in the cryptocurrency sector through fake job offers and sophisticated phishing tactics.
February 21, 2025 | Cybernews Summaries
A critical authentication bypass vulnerability in Palo Alto Networks’ PAN-OS, CVE-2025-0108, has been discovered and is being actively exploited, allowing attackers to gain root access to affected systems.
February 21, 2025 | Cybernews Summaries
The “Ghost” ransomware group, also known as Cring and Crypt3r, has been conducting widespread cyberattacks since 2021, targeting critical infrastructure and exploiting vulnerabilities in software such as Fortinet FortiOS and Microsoft Exchange.
February 21, 2025 | Cybernews Summaries
Mobile phishing attacks, or “mishing,” have surged significantly, exploiting the unique vulnerabilities of mobile devices and targeting both personal and corporate users through advanced social engineering techniques.
February 20, 2025 | Cybernews Summaries
The United Kingdom has sanctioned ZSERVERS, a key player in the Russian cybercrime infrastructure, along with its affiliates and a UK front company, to enhance national security and disrupt ransomware operations targeting the UK.