Data from various Infostealers
Several collections of login data reveal one of the largest data thefts in history. As cybernews reports, a total of 16 billion login credentials were exposed. The data most likely originated from various infostealers.
Incident response plan necessary
ClickFix is already being used by a number of nation-state actors such as APT 28 and Kimsuky. The distribution of stealer malware such as Lumma Stealer via the social engineering campaign is particularly popular.
Germany affected
Security researchers from Kaspersky have discovered a particularly sophisticated variant of the Triada Trojan on imitation Android smartphones. More than 2,600 users worldwide, including in Germany, are affected.
Targeted phishing campaigns
Medusa ransomware has posed a growing threat to companies worldwide since the beginning of 2025. Check Point warns of the increasing activity of this hacker group.
New variants of SparrowDoor
After a long period of dormancy, the Chinese hacker group FamousSparrow is active again. According to the IT security company ESET, the group has become increasingly dangerous and has deployed new, sophisticated espionage tools.
Cybercrime 2024
Cybercriminals have adapted their methods in 2024 and are increasingly targeting mobile devices and the cryptocurrency sector.
Thousands of TP-Link Archer routers as target
Security researchers from the threat research team at Cato Networks have identified a new threat: the IoT botnet “Ballista”. This malware exploits a serious vulnerability in TP-Link Archer routers to spread unhindered across the internet.
Hackers infiltrate over 330 malicious apps into Google Play
Cyber criminals have managed to bypass Android’s security mechanisms and infect over 60 million users worldwide with malware. Experts from Bitdefender Labs discovered a large-scale malware campaign with over 330 infected apps.
Ransomware group develops brute force framework
The ransomware group BlackBasta has developed a powerful tool to automate brute force attacks on edge network devices such as firewalls and VPNs. The framework, called “BRUTED”, allows attackers to crack targeted credentials and scale ransomware attacks on vulnerable networks.
Most Read Articles
4. March 2026
27. February 2026
26. February 2026
24. February 2026
24. February 2026