Cyber Security News

Kyber Ransomware And The Post-Quantum Illusion
Date

Kyber Ransomware And The Post-Quantum Illusion

Ransomware operators adopt whatever creates the most pressure on victims. This may mean faster encryption, stronger extortion tactics, or deeper attacks on virtual infrastructure. In 2026, the Kyber ransomware group added a new layer of psychological and technical pressure by claiming to use post-qu

The Gentlemen Ransomware Expands With SystemBC Proxy Attacks
Date

The Gentlemen Ransomware Expands With SystemBC Proxy Attacks

Ransomware operators continue to refine their playbooks. The latest evolution of the Gentlemen ransomware shows how fast these groups adapt to scale and stay stealthy. It began as a relatively new ransomware-as-a-service (RaaS) operation in mid-2025. It has already matured into a more dangerous ente

AI-Voice Agents Now Seen Automating Vishing Attacks
Date

AI-Voice Agents Now Seen Automating Vishing Attacks

The emergence of AI-driven cybercrime platforms has fundamentally reshaped the threat landscape. Few developments illustrate this shift more clearly than the ATHR platform and its enablement of Telephone-Oriented Attack Delivery (TOAD) attacks. By combining traditional social engineering with advanc

Iranian Hackers Hunt Vulnerable Industrial Control Systems
Date

Iranian Hackers Hunt Vulnerable Industrial Control Systems

The escalation of Iranian cyber activity targeting critical infrastructure has become a defining feature of the 2026 threat landscape, prompting urgent warnings from U.S. government agencies and cybersecurity firms. Recent joint advisories from the FBI, CISA, NSA, and international partners highligh

Iranian Threat Actors Deploying Pseudo-Ransomware
Date

Iranian Threat Actors Deploying Pseudo-Ransomware

Iranian threat actors have increasingly adopted ransomware-like tactics. These are not purely criminal enterprises, but instruments of statecraft. Over the past several years, and especially amid escalating geopolitical tensions, these actors have refined a hybrid model, which blends cybercrime tech

The Weaponization Of Surveillance For Cyber-Kinetic Warfare
Date

The Weaponization Of Surveillance For Cyber-Kinetic Warfare

Cyber and kinetic warfare have merged into a new phase. Internet-connected devices, especially IP cameras, are now both intelligence assets and strategic risks. Recent events in the 2026 Middle East conflict show how compromised surveillance, coordinated cyberattacks, and DDoS campaigns are changing

LiteLLM PyPI Package Backdoored
Date

LiteLLM PyPI Package Backdoored

A supply chain attack campaign attributed to the TeamPCP threat group marks one of the most consequential and fast-moving compromises of modern software development infrastructure. The attackers targeted trusted developer tools and open-source ecosystems. This campaign showed how a single foot

VoidStealer Seen Bypassing Chrome's App-Bound Encryption
Date

VoidStealer Seen Bypassing Chrome's App-Bound Encryption

The emergence of VoidStealer marks a significant evolution in the infostealer malware landscape. It demonstrates how quickly threat actors adapt to defensive innovations. By using a novel debugger-based technique to bypass Google Chrome's Application-Bound Encryption (ABE), VoidStealer highlights th

New iOS Exploit Kit DarkSword Targets iPhones
Date

New iOS Exploit Kit DarkSword Targets iPhones

A newly uncovered iOS exploitation framework called DarkSword is reshaping the mobile threat landscape. It signals a shift from targeted espionage tools to scalable, multipurpose attack infrastructure. Joint research from Google Threat Intelligence Group (GTIG) and Lookout shows how advanced exploit