AI-Generated Lcryx Ransomware Found in H2Miner Botnet

Security researchers at Fortinet recently discovered something very unusual and concerning, an AI-generated ransomware called Lcrypt0rx is being deployed through an active cryptomining botnet named H2Miner. This appears to be one of the first real-world cases of artificial intelligence being used to generate ransomware. The H2Miner botnet has been around since at least 2019. It … Continued

Chinese Hackers Target Taiwan’s Semiconductor Industry in a Major Sophisticated Cyber Attack

In a worrying development, cybersecurity experts have found that hackers backed by China are increasingly targeting Taiwan’s semiconductor sector. These attacks happened between March and June 2025, and the goal was to steal sensitive data from chipmakers, financial analysts, and related companies in the tech supply chain. A new report from cybersecurity firm Proofpoint highlights … Continued

New Matanbuchus 3.0 Malware Tool Helps Hackers Install Ransomware Silently

A dangerous new malware loader called Matanbuchus 3.0 has just been discovered in the wild. This upgraded version is being used to silently install ransomware and other harmful tools on systems. It’s not just a tweak, the loader has been completely rewritten from scratch, making it more powerful, more stealthy, and harder to detect. Matanbuchus … Continued

Google’s Big Sleep AI Halts Critical SQLite Bug Before It Hits

Google has achieved something remarkable in cybersecurity. Its AI agent, known as Big Sleep, has successfully detected and prevented a cyberattack before it could happen. This is being described as the first real-world case where an AI stopped an exploit from being used in the wild. The vulnerability involved is called CVE-2025-6965. It was a … Continued

Trojanized Telegram App Steals Data from Chinese Android Phones

Reports indicate a significant cybersecurity threat: altered versions of the popular messaging application, Telegram, are being found pre-installed on specific budget-friendly Android smartphones. These devices are primarily distributed within the Chinese market. The modified applications are designed with a malicious intent: to illicitly acquire sensitive user data. This includes highly personal information and, crucially, cryptocurrency. … Continued

Newsletter line