AI-Enhanced Malware “EvilAI” Exposes How Cybercrime Is Evolving Worldwide

A new wave of malware known as EvilAI is worrying security researchers because it uses artificial intelligence to stay hidden and look trustworthy. Instead of being obvious viruses, these threats are disguised as normal productivity or AI apps. At first glance, they seem safe, but once installed, they quietly deliver harmful code into a system. … Continued

Ukrainian Ransomware Suspect Added to Europe’s Most Wanted List

A Ukrainian man accused of carrying out large-scale ransomware attacks has officially been added to Europe’s Most Wanted list. Authorities say he played a key role in cyberattacks that caused serious financial and operational damage to companies around the world. The fugitive has been identified as Volodymyr Viktorovych Tymoshchuk, a 28-year-old Ukrainian citizen. Law enforcement … Continued

AsyncRAT Abuses ConnectWise ScreenConnect to Steal Passwords and Cryptocurrency

Cybersecurity researchers have discovered that attackers are misusing ConnectWise ScreenConnect, a widely used remote access tool, to deliver AsyncRAT, a dangerous Remote Access Trojan. The malicious campaign is designed to steal sensitive data, login credentials, and even cryptocurrency from unsuspecting victims. The attack begins when a victim downloads or installs a tampered version of the … Continued

SAP S/4HANA Users Urged to Patch Critical Exploited Bug

A new security report has revealed that a dangerous flaw in Apple’s Messages app was used to spy on journalists. At the same time, businesses using SAP S/4HANA are being warned about a critical vulnerability that attackers are already exploiting. Both cases show how quickly hackers move and why updating software immediately is more important … Continued

WEEPSTEEL Malware Deployed in Ongoing Sitecore Zero-Day Campaign

A new zero-day vulnerability has been discovered in Sitecore, and attackers are already taking advantage of it. The flaw is tracked as CVE-2025-53690 and has been linked to active exploitation in the wild. Security researchers from Mandiant revealed that hackers are using this weakness to run malicious code on vulnerable servers, giving them a direct … Continued

How Attackers Used Google’s Own Crawler to Boost Gambling Websites

Security researchers have discovered a cyber campaign where Chinese-linked hackers are secretly manipulating Google search results to push gambling websites. The operation, uncovered by cybersecurity company ESET, has been named GhostRedirector. Evidence shows it started in August 2024 and was still active in June 2025, running undetected for many months. The attackers managed to compromise … Continued

Newsletter line