Cybersecurity & AI Insights

Expert analysis from Ricnology

Qilin Ransomware Exploits Korean MSP for Mass Attacks
cybersecurity tech news security

Qilin Ransomware Exploits Korean MSP for Mass Attacks

Qilin ransomware operators compromise South Korean managed service provider infrastructure to deploy encryption payloads across multiple financial institutions through trusted supply chain access

November 29, 2025 3 min read
Shai-Hulud Spreads from NPM to Maven Package Repos
cybersecurity tech news security

Shai-Hulud Spreads from NPM to Maven Package Repos

Shai-Hulud supply chain campaign extends beyond NPM to target Maven Central repositories, poisoning Java dependencies to steal credentials and secrets from enterprise development environments

November 29, 2025 3 min read
Aisuru Transforms IoT Botnet into Commercial Proxies
cybersecurity tech news security

Aisuru Transforms IoT Botnet into Commercial Proxies

Aisuru cybercriminals shift from distributed denial-of-service to residential proxy commercialization, monetizing compromised IoT infrastructure by selling anonymization services to other threat actors

November 29, 2025 3 min read
Shai-Hulud v2 Supply Chain Attack Exfiltrates Secrets
cybersecurity tech news security

Shai-Hulud v2 Supply Chain Attack Exfiltrates Secrets

Shai-Hulud v2 campaign expands from NPM to Maven repositories, deploying malicious packages that harvest thousands of API keys, credentials, and secrets from compromised development environments

November 28, 2025 3 min read
Qilin Ransomware Targets South Korean Financial MSP
cybersecurity tech news security

Qilin Ransomware Targets South Korean Financial MSP

Qilin ransomware operators compromise South Korean managed service provider to deploy ransomware across multiple financial sector clients, exploiting supply chain trust relationships for mass encryption

November 27, 2025 3 min read
Aisuru Switches from DDoS Service to Proxy Leasing
cybersecurity tech news security

Aisuru Switches from DDoS Service to Proxy Leasing

Aisuru cybercriminals transform IoT botnet from denial-of-service platform into residential proxy rental infrastructure, commercializing compromised devices for IP anonymization and attribution evasion

November 27, 2025 3 min read
RomCom Leverages SocGholish for Mythic Agent Delivery
cybersecurity tech news security

RomCom Leverages SocGholish for Mythic Agent Delivery

RomCom threat actors deploy Mythic command-and-control agent through SocGholish fake browser update infrastructure, establishing persistent access for espionage and data exfiltration operations

November 26, 2025 2 min read
Aisuru Botnet Launches IoT Device Rental Platform
cybersecurity tech news security

Aisuru Botnet Launches IoT Device Rental Platform

Aisuru operators transition from DDoS-for-hire to residential proxy rental business, monetizing compromised IoT devices by selling IP rotation and geographic distribution services to cybercriminals

November 26, 2025 3 min read
Critical 7-Zip Flaw Allows Remote Code Execution
cybersecurity tech news security

Critical 7-Zip Flaw Allows Remote Code Execution

Severe 7-Zip vulnerability enables attackers to execute arbitrary code through symbolic link manipulation in malicious archives, requiring immediate patching across systems using affected compression software versions

November 25, 2025 3 min read
Aisuru Rebrands as Residential Proxy Service Provider
cybersecurity tech news security

Aisuru Rebrands as Residential Proxy Service Provider

Aisuru cybercriminals abandon denial-of-service operations to commercialize IoT botnet infrastructure as residential proxy network, selling IP anonymization and geographic distribution to attackers

November 25, 2025 3 min read
Canadian Authorities Fine Cryptomus $176M for AML Gaps
cybersecurity tech news security

Canadian Authorities Fine Cryptomus $176M for AML Gaps

Canadian regulators impose $176 million penalty on Cryptomus cryptocurrency platform for systematic anti-money laundering violations and processing ransomware payments without customer due diligence

November 24, 2025 3 min read
Aisuru Operators Monetize Botnet as Proxy Infrastructure
cybersecurity tech news security

Aisuru Operators Monetize Botnet as Proxy Infrastructure

Former DDoS botnet Aisuru transitions to residential proxy commercialization, renting compromised IoT devices to cybercriminals for IP rotation, geographic distribution, and attribution evasion services

November 24, 2025 3 min read