Quantum Safe News Center

Your sources for the latest in quantum safe technologies, zero trust architecture and next-gen cybersecurity for distributed workforces.

AI-Driven Lcryx Ransomware Emerges in Cryptomining Botnet

Discover the AI-generated Lcryx ransomware in the H2miner cryptomining botnet. Learn how to protect your infrastructure from evolving cyber threats.

By Edward Zhou 3 min read
common.read_full_article

Preventing ClickFix Attacks: Safeguarding Against Human Error

Discover the ClickFix technique, a new threat exploiting human error. Learn prevention strategies to protect your organization from cyber attacks.

By Alan V Gutnov 3 min read
common.read_full_article

AI-Generated Phishing: A Growing Threat to Small Businesses

Discover how the deepfake economy threatens small businesses and learn essential strategies to protect your company from AI-driven scams.

By Alan V Gutnov 4 min read
common.read_full_article

Beware: Matanbuchus 3.0 Malware Spreads via Microsoft Teams Calls

Discover the Matanbuchus malware and its use of Microsoft Teams for deployment. Learn how to protect your organization from this evolving threat.

By Alan V Gutnov 2 min read
common.read_full_article

LameHug: AI-Powered Malware from APT28 Linked to Phishing Campaign

Explore LameHug malware, an AI-driven threat linked to APT28. Learn about its mechanisms and how to safeguard your systems against it.

By Alan V Gutnov 3 min read
common.read_full_article

Hackers Exploit GitHub Accounts to Distribute Amadey Malware

Discover how threat actors exploit GitHub accounts to host malware like Amadey, bypassing security filters. Learn more about this evolving cyber threat.

By Edward Zhou 5 min read
common.read_full_article

Understanding Mamona Ransomware: A New Offline Threat

Discover the dangers of Mamona ransomware, an offline threat targeting Windows systems. Learn detection and prevention strategies. Stay secure!

By Edward Zhou 3 min read
common.read_full_article

Authorities Dismantle DiskStation Ransomware Gang Targeting NAS

Discover how police dismantled the Diskstation ransomware gang targeting NAS devices. Learn how to protect your data now!

By Edward Zhou 3 min read
common.read_full_article

Hackers Exploit GitHub for Amadey Malware and Data Stealers

Discover how threat actors exploit GitHub for malicious payloads, tools, and Amadey malware. Learn defensive strategies against evolving cyber threats.

By Alan V Gutnov 4 min read
common.read_full_article