• November 25 2025

    GTG 1002: Claude Hijacked For The First AI Led Cyberattack

    Anthropic’s Claude was manipulated into a cyber espionage campaign. See how it happened, why it matters, and how ADX can block machine-speed data theft.

  • November 20 2025

    New Matrix Push C2 Abuses Push Notifications to Deliver Malware

    Investigating Matrix Push C2, a browser based command and control system that uses push notifications to deliver malware, run phishing campaigns, and steal data across platforms.

  • November 19 2025

    Clop’s New Extortion Wave Hits Oracle E-Business Suite

    Clop exploited an Oracle E-Business Suite zero-day to steal data from major organizations. Here’s how it happened and what it means for supply-chain security.

  • November 14 2025

    Qilin Ransomware: Analysis, Impact and Defense (2025)

    In-depth 2025 Qilin ransomware analysis covering its rise, attack chain, intimidation tactics, double extortion model, and defense strategies.

  • November 11 2025

    Kerberoasting Attack Explained: Example And Prevention Guide

    Kerberoasting attack explained with examples, detection tips, and prevention steps. Learn how to secure Active Directory from credential theft.

  • September 17 2025

    The Interlock Ransomware Problem Security Teams Can’t Ignore

    Interlock ransomware is disrupting healthcare, cities, and infrastructure in 2025 with fake update lures, data theft, and double extortion tactics.

  • September 9 2025

    Scattered Spider, Lapsus$, and ShinyHunters Form New Cybercrime Alliance

    Scattered Spider, Lapsus$, and ShinyHunters form new cybercrime alliance, leaking data and extorting victims via Telegram. Here is everything defenders need to know.

  • August 26 2025

    Akira Ransomware Group: The New Face of Ransomware

    Learn how Akira ransomware group is defining cybercrime worldwide. Find out about their methods, how they focus on small and medium-sized businesses (SMBs), and get practical advice to help protect your organization.

  • July 21 2025

    Scattered Spider’s Expanding Web of Ransomware Attacks

    Scattered Spider is responsible for a series of cyberattacks in 2024-2025, primarily targeting retailers, insurance companies, and airlines via social engineering, identity theft, and ransomware.

  • July 14 2025

    Fog Ransomware Surges in 2025 Hitting Schools and Banks Alike

    Fog ransomware has surged in 2025, targeting the educational and financial sector. Learn about its technical tactics, double extortion methods, and defense strategies.

  • June 10 2025

    BlackSuit Ransomware: How It Works and Who’s Behind It

    Learn how BlackSuit ransomware operates, who is behind it, and why it’s becoming a bigger cyberthreat. This simple guide also offers key tips to protect yourself and respond the right way.

  • May 7 2025

    What Happens When Ransomware Gangs Attack Each Other?

    Learn how to stay safe from Black Basta ransomware group with advice on how to spot, prevent, and recover from attacks. Understand how these attacks work, explore real-life examples, and discover strategies to protect against ransomware.