Analysis
Akira (or Akira Ransomware) is fast becoming one of the fastest growing ransomware families, utilizing a double extortion tactic, a Ransomware-as-a-Service (RaaS) distribution model and unique payment options.
Report
Password-related cyberattacks through malware infections are at the top of the list of the most popular attacks. Nearly 31 percent of all security breaches analyzed by the Verizon DBIR team since 2013 have been related to stolen credentials.
New malware discovered
A new threat has emerged on the cybercrime scene that is specifically targeting ATMs in Europe and could therefore endanger the entire banking industry. The malware, known as “EU ATM Malware”, was recently offered for sale on a hacker forum.
10 international arrest warrants, 4 arrests
Investigators are talking about the biggest strike against cyber criminals: more than 100 servers have been confiscated and 1300 domains put out of operation in an operation in several countries worldwide.
Akamai study
Akamai Technologies, provider of web, cloud and security solutions, has presented its new “State of the Internet” report. This shows that the number of DDoS attacks is increasing most rapidly in the EMEA region (Europe, Middle East, Africa).
New attack technique discovered
Passkeys and FIDO authentication are designed to provide robust protection against phishing attacks. However, researchers have now discovered a critical loophole that can undermine even strong passkey authentication. Attackers can exploit a targeted downgrade technique to force users into using insecure login methods. This risk grows as FIDO adoption
Back door for hackers
Security researchers from Check Point have discovered a serious vulnerability in the popular AI-based developer tool Cursor. The vulnerability allows attackers to permanently inject malicious code into development projects completely unnoticed.
Ad
New cyber espionage campaign
Security researchers at Arctic Wolf Labs have discovered a sophisticated cyberattack campaign targeting the Turkish defense industry.
Ad
Recipe for a disaster
From a harmless kitchen helper to a cyber threat – the case of the “RecipeLister” app shows how cleverly malware is disguised today.
From technically sophisticated to disturbingly creative
The infamous Trojan from 2019 is once again making headlines. Security researchers from ESET have discovered that AsyncRAT is now even more dangerous and has spread much more widely thanks to new variants.
BeyondTrust Report 2025 warns
Microsoft is increasingly in the crosshairs of hackers. According to the latest Microsoft Vulnerabilities Report from security company BeyondTrust, a total of 1,360 vulnerabilities were recorded in Microsoft systems in 2024 – more than ever before.
Incident response plan necessary
ClickFix is already being used by a number of nation-state actors such as APT 28 and Kimsuky. The distribution of stealer malware such as Lumma Stealer via the social engineering campaign is particularly popular.
Session tokens are also recorded
Security researchers from Sophos X-Ops have investigated the workings of Evilginx. The malware, which is based on the widely used open source web server nginx, poses a significant threat to IT security by enabling targeted adversary-in-the-middle attacks and can even bypass multi-factor authentication (MFA).
Germany affected
Security researchers from Kaspersky have discovered a particularly sophisticated variant of the Triada Trojan on imitation Android smartphones. More than 2,600 users worldwide, including in Germany, are affected.
Ad

Events

Veranstaltungen

13.10.2025
 - 17.10.2025
Dubai World Trade Center

Most read articles.

Ad
Ad
Ad
Ad