Rhadamanthys Stealer Servers Reportedly Seized; Admin Urges Immediate Reinstallation

Widespread reports suggest major law enforcement operation targeting notorious malware infrastructure has disrupted the Rhadamanthys stealer control panel, prompting urgent security alerts. In a significant development within the cybersecurity community, reports indicate that German law enforcement authorities may have seized…

Authentication Coercion: How Windows Machines Are Tricked into Leaking Credentials

Cybersecurity researchers have identified a growing trend in Windows-targeted attacks that exploit fundamental operating system features to force machines into surrendering valuable credentials without requiring user interaction or system vulnerabilities. Known as authentication coercion, this attack method manipulates legitimate Remote…

Authentication Coercion Attack Tricks Windows Machines into Revealing Credentials to Attack-controlled Servers

Authentication coercion represents a sophisticated and evolving threat targeting Windows and Active Directory environments across organizations globally. This attack method exploits the fundamental communication mechanisms embedded within every Windows operating system, manipulating machines into automatically transmitting sensitive credentials to attacker-controlled…

English-Speaking Cybercriminal Network ‘The COM’ Drives Global Cyberattacks

The English-speaking cybercriminal ecosystem known as “The COM” has evolved from a niche underground culture into a sophisticated, professional service-oriented economy that orchestrates some of the world’s most disruptive cyberattacks. Over the past decade, this decentralized network has transformed from…