Tag Malware

Man Sentenced to 7 Years for Hacking Jail Systems to Secure Friend’s Early Release

A recent case underscores the persistent threat posed by cybersecurity breaches, particularly within government systems. **Konrads Voits**, a young hacker from Ypsilanti, Michigan, has been sentenced to over seven years in prison for attempting to breach the Washtenaw County Jail’s computer system. His objective was to manipulate prison records in…

Read MoreMan Sentenced to 7 Years for Hacking Jail Systems to Secure Friend’s Early Release

Hackers Discover New Method to Bypass Microsoft Office 365 Safe Links

Recent findings from security researchers indicate that some hacking groups have discovered a method to circumvent a critical security feature within Microsoft Office 365, aimed at safeguarding users from phishing and malware threats. Known as Safe Links, this feature is bundled with Microsoft’s Advanced Threat Protection (ATP) and operates by…

Read MoreHackers Discover New Method to Bypass Microsoft Office 365 Safe Links

Hackers Behind the 2018 Winter Olympics Attack Are Still Active and Thriving

In a recent development that recalls the infamous ‘Olympic Destroyer’ cyber attack from the 2018 Winter Olympics, the same group of hackers has emerged once again, this time targeting biological and chemical threat prevention laboratories across Europe and Ukraine, alongside several financial institutions in Russia. The malicious campaign reflects a…

Read MoreHackers Behind the 2018 Winter Olympics Attack Are Still Active and Thriving

New Malware Family Employs Custom UDP Protocol for Command and Control Communications

New Cyber Espionage Campaign Targets Southeast Asian Organizations with Advanced Malware Security experts have recently identified a sophisticated cyber espionage campaign, attributed to a hacking group known as RANCOR. This group is reportedly linked to the KHRAT backdoor Trojan and has been primarily targeting entities in Southeast Asia, specifically political…

Read MoreNew Malware Family Employs Custom UDP Protocol for Command and Control Communications

Uncover the Truth: Exploring the Depths of the Cybercriminal Underground Beyond the Headlines

Each month, Cybersixgill’s threat experts provide insights into the latest tactics, techniques, and procedures employed by cybercriminals. Their reports shed light on emerging threats from the underground, detailing the actors involved and offering guidance on risk mitigation strategies. Regular updates on vulnerabilities, ransomware, and malware trends from the deep and…

Read MoreUncover the Truth: Exploring the Depths of the Cybercriminal Underground Beyond the Headlines

Stolen D-Link Certificate Exploited to Digitally Sign Surveillance Malware

Digitally signed malware has gained traction recently, utilizing legitimate digital certificates to mask malicious activities. Recent investigations have uncovered a malware campaign employing stolen valid digital certificates from Taiwanese technology firms, including D-Link, to authenticate their harmful applications and thereby appear trustworthy to unwitting users. Digital certificates, issued by recognized…

Read MoreStolen D-Link Certificate Exploited to Digitally Sign Surveillance Malware

Gaza Cyber Group Strikes Again with New Attacks on Palestinian Authority

New Cyber Threat Targets Palestinian Authority With Advanced Malware Attack In a recent development in the realm of cybersecurity, Check Point Threat Intelligence Team has identified a resurgence of an advanced persistent threat (APT) group launching targeted attacks against institutions in the Middle East, particularly the Palestinian Authority. This latest…

Read MoreGaza Cyber Group Strikes Again with New Attacks on Palestinian Authority

Developer Creates Malware in Just One Week Using AI Assistance

Artificial Intelligence & Machine Learning, Next-Generation Technologies & Secure Development, The Future of AI & Cybersecurity Check Point Discovers VoidLink Framework as the First ‘Advanced’ AI-Generated Threat Rashmi Ramesh (rashmiramesh_) • January 21, 2026 Image: MeshCube/Shutterstock Security researchers at Check Point have identified a significant advancement in the realm of…

Read MoreDeveloper Creates Malware in Just One Week Using AI Assistance