Cyber Security News

Bluekit Phishing Service Includes AI Assistant
Date

Bluekit Phishing Service Includes AI Assistant

The emergence of Bluekit, as recorded by security researchers at Varonis, marks a significant evolution in the phishing-as-a-service (PhaaS) ecosystem. It shows how cybercrime continues to industrialize through automation, centralization, and the integration of artificial intelligence. Recent resea

Snow Malware Turns Microsoft Teams Into An Intrusion Platform
Date

Snow Malware Turns Microsoft Teams Into An Intrusion Platform

Cybercriminals keep showing that the easiest way into an enterprise is often through trust, not software vulnerabilities. Google's Mandiant Team discovered a new threat actor, UNC6692, that proves this point. This group weaponizes Microsoft Teams, abuses helpdesk impersonation, and deploys a custom

Kyber Ransomware And The Post-Quantum Illusion
Date

Kyber Ransomware And The Post-Quantum Illusion

Ransomware operators adopt whatever creates the most pressure on victims. This may mean faster encryption, stronger extortion tactics, or deeper attacks on virtual infrastructure. In 2026, the Kyber ransomware group added a new layer of psychological and technical pressure by claiming to use post-qu

The Gentlemen Ransomware Expands With SystemBC Proxy Attacks
Date

The Gentlemen Ransomware Expands With SystemBC Proxy Attacks

Ransomware operators continue to refine their playbooks. The latest evolution of the Gentlemen ransomware shows how fast these groups adapt to scale and stay stealthy. It began as a relatively new ransomware-as-a-service (RaaS) operation in mid-2025. It has already matured into a more dangerous ente

AI-Voice Agents Now Seen Automating Vishing Attacks
Date

AI-Voice Agents Now Seen Automating Vishing Attacks

The emergence of AI-driven cybercrime platforms has fundamentally reshaped the threat landscape. Few developments illustrate this shift more clearly than the ATHR platform and its enablement of Telephone-Oriented Attack Delivery (TOAD) attacks. By combining traditional social engineering with advanc

Iranian Hackers Hunt Vulnerable Industrial Control Systems
Date

Iranian Hackers Hunt Vulnerable Industrial Control Systems

The escalation of Iranian cyber activity targeting critical infrastructure has become a defining feature of the 2026 threat landscape, prompting urgent warnings from U.S. government agencies and cybersecurity firms. Recent joint advisories from the FBI, CISA, NSA, and international partners highligh

Iranian Threat Actors Deploying Pseudo-Ransomware
Date

Iranian Threat Actors Deploying Pseudo-Ransomware

Iranian threat actors have increasingly adopted ransomware-like tactics. These are not purely criminal enterprises, but instruments of statecraft. Over the past several years, and especially amid escalating geopolitical tensions, these actors have refined a hybrid model, which blends cybercrime tech

The Weaponization Of Surveillance For Cyber-Kinetic Warfare
Date

The Weaponization Of Surveillance For Cyber-Kinetic Warfare

Cyber and kinetic warfare have merged into a new phase. Internet-connected devices, especially IP cameras, are now both intelligence assets and strategic risks. Recent events in the 2026 Middle East conflict show how compromised surveillance, coordinated cyberattacks, and DDoS campaigns are changing

LiteLLM PyPI Package Backdoored
Date

LiteLLM PyPI Package Backdoored

A supply chain attack campaign attributed to the TeamPCP threat group marks one of the most consequential and fast-moving compromises of modern software development infrastructure. The attackers targeted trusted developer tools and open-source ecosystems. This campaign showed how a single foot