November 25 2025
GTG 1002: Claude Hijacked For The First AI Led Cyberattack
Anthropic’s Claude was manipulated into a cyber espionage campaign. See how it happened, why it matters, and how ADX can block machine-speed data theft.
November 20 2025
New Matrix Push C2 Abuses Push Notifications to Deliver Malware
Investigating Matrix Push C2, a browser based command and control system that uses push notifications to deliver malware, run phishing campaigns, and steal data across platforms.
November 19 2025
Clop’s New Extortion Wave Hits Oracle E-Business Suite
Clop exploited an Oracle E-Business Suite zero-day to steal data from major organizations. Here’s how it happened and what it means for supply-chain security.
November 14 2025
Qilin Ransomware: Analysis, Impact and Defense (2025)
In-depth 2025 Qilin ransomware analysis covering its rise, attack chain, intimidation tactics, double extortion model, and defense strategies.
November 11 2025
Kerberoasting Attack Explained: Example And Prevention Guide
Kerberoasting attack explained with examples, detection tips, and prevention steps. Learn how to secure Active Directory from credential theft.
September 17 2025
The Interlock Ransomware Problem Security Teams Can’t Ignore
Interlock ransomware is disrupting healthcare, cities, and infrastructure in 2025 with fake update lures, data theft, and double extortion tactics.
September 9 2025
Scattered Spider, Lapsus$, and ShinyHunters Form New Cybercrime Alliance
Scattered Spider, Lapsus$, and ShinyHunters form new cybercrime alliance, leaking data and extorting victims via Telegram. Here is everything defenders need to know.
August 26 2025
Akira Ransomware Group: The New Face of Ransomware
Learn how Akira ransomware group is defining cybercrime worldwide. Find out about their methods, how they focus on small and medium-sized businesses (SMBs), and get practical advice to help protect your organization.
July 21 2025
Scattered Spider’s Expanding Web of Ransomware Attacks
Scattered Spider is responsible for a series of cyberattacks in 2024-2025, primarily targeting retailers, insurance companies, and airlines via social engineering, identity theft, and ransomware.
July 14 2025
Fog Ransomware Surges in 2025 Hitting Schools and Banks Alike
Fog ransomware has surged in 2025, targeting the educational and financial sector. Learn about its technical tactics, double extortion methods, and defense strategies.
June 10 2025
BlackSuit Ransomware: How It Works and Who’s Behind It
Learn how BlackSuit ransomware operates, who is behind it, and why it’s becoming a bigger cyberthreat. This simple guide also offers key tips to protect yourself and respond the right way.
May 7 2025
What Happens When Ransomware Gangs Attack Each Other?
Learn how to stay safe from Black Basta ransomware group with advice on how to spot, prevent, and recover from attacks. Understand how these attacks work, explore real-life examples, and discover strategies to protect against ransomware.












