A ransomware gang exploited the critical React2Shell vulnerability (CVE-2025-55182) to gain initial access to corporate ...
VolkLocker uses AES-256 in Galois/Counter Mode ( GCM) for encryption through Golang's "crypto/rand" package. Every encrypted ...
A new version of VolkLocker, wielded by the pro-Russia RaaS group CyberVolk, has some key enhancements but one fatal flaw.
First, the bad news: the CyberVolk 2.x (aka VolkLocker) ransomware-as-a-service operation that launched in late summer. It's ...
React2Shell vulnerability CVE-2025-55182 is actively exploited to deploy Linux malware, run commands, and steal cloud ...
A new Android malware-as-a-service (MaaS) named Cellik is being advertised on underground cybercrime forums offering a robust ...
Thinking a deleted file is truly gone is wishful thinking — but Windows’ sDelete tool can wipe it permanently and make it ...
Tens of thousands of users have installed GhostPoster Firefox extensions, which rely on steganography to hide malware in ...
CyberVolk is a relatively young, pro-Russian hacktivist collective that emerged in 2024.The group’s entire infrastructure is ...
Bitdefender recently discovered a fraudulent torrent for the film One Battle After Another that contains an ingenious Trojan delivery mechanism. The security company claims its tools ...
Cybercriminals are exploiting demand for pirated movies by disguising malware as a fake torrent of “One Battle After Another, ...
Q-day will occur when a state acquires a quantum computer powerful enough to crack the encryption on which modern life ...