
Payload Ransomware Group Claims Breach of Royal Bahrain Hospital
Royal Bahrain Hospital reportedly targeted by Payload ransomware, with 110 GB of sensitive data allegedly stolen.

Royal Bahrain Hospital reportedly targeted by Payload ransomware, with 110 GB of sensitive data allegedly stolen.

New banking malware VENON targets Brazilian users, developed in Rust, diverging from traditional Delphi-based threats.

Investigating Slopoly malware’s impact, AI origins, and role in Interlock attacks.

North Korea’s Lazarus Group deploys Medusa ransomware against critical sectors, targeting US healthcare.

Polish authorities have arrested a 47-year-old man suspected of participating in cybercrimes associated with the Phobos ransomware. During the operation,

The Warlock ransomware gang has infiltrated SmarterTools’ network by breaching the company’s email system but has not disrupted critical business

With diminishing returns from data theft alone, ransomware gangs are exploring the return to data encryption for extortion. Altered tactics

Cybersecurity experts have discovered Reynolds ransomware, a new threat employing the Bring Your Own Vulnerable Driver (BYOVD) technique. This approach

Fashion brand Canada Goose is tackling claims of a 600,000-record breach linked to hacker group ShinyHunters. The company states it’s

Iron Mountain, a reputed data storage provider, has confirmed a breach by the Everest extortion group, affecting primarily marketing data.

Over the past three months, the formidable Aisuru botnet has executed more than 1,300 DDoS attacks, one of which reached

Clop ransomware continues to evolve as one of the most destructive global cyber threats. Learn how it spreads, its impact,

Violet Typhoon, a China-linked cyber-espionage actor active since 2015, targets governments, NGOs, and academic institutions using SharePoint zero-day exploits. Its

GhostSec evolved from hacktivist roots into a hybrid ransomware threat, using GhostLocker to target global sectors with encryption, extortion, and

This threat actor profile examines the Warlock ransomware group, tracked as Storm-2603 and GOLD SALEM. Active since March 2025, Warlock

Gunra is a double-extortion ransomware group, active since April 2025, leveraging leaked Conti code for high-speed, cross-platform attacks. With victims

APT36 (Transparent Tribe) is exploiting Linux .desktop files in a new espionage campaign against Indian defense and government targets. Disguised

Crypto24 is a rising ransomware group targeting mid-sized global firms, using stealth tools, cloud exfiltration, and double-extortion tactics to steal,

Charon ransomware, emerging in 2025, targets Middle East sectors with APT-level tactics, DLL sideloading, hybrid encryption, and advanced evasion, posing

APT28, aka Fancy Bear, a Russian GRU-linked group, conducts sophisticated espionage and information theft campaigns globally, targeting governments and critical

DragonForce is a ransomware and data extortion group that evolved from a pro-Palestinian hacktivist collective into a financially motivated cybercriminal

The Lynx ransomware group is a financially motivated threat actor operating under a Ransomware-as-a-Service (RaaS) model. Emerging as a successor
Subscribe to the Daily Security Review Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.