Cybersecurity & AI Insights

Expert analysis from Ricnology

Qilin Ransomware Compromises Korean MSP Infrastructure
cybersecurity tech news security

Qilin Ransomware Compromises Korean MSP Infrastructure

Qilin ransomware operators breach South Korean managed service provider to deploy encryption across financial institution clients, exploiting trusted network access for supply chain ransomware attack

December 1, 2025 3 min read
Shai-Hulud v2 Poisons NPM and Maven Package Ecosystems
cybersecurity tech news security

Shai-Hulud v2 Poisons NPM and Maven Package Ecosystems

Shai-Hulud v2 campaign deploys malicious packages across NPM and Maven repositories, harvesting credentials and API keys from JavaScript and Java development environments through dependency poisoning

December 1, 2025 3 min read
Aisuru Operators Sell Compromised IoT as Proxy Access
cybersecurity tech news security

Aisuru Operators Sell Compromised IoT as Proxy Access

Aisuru cybercriminals transition from DDoS-for-hire to residential proxy business model, commercializing compromised IoT devices by selling IP rotation and anonymization services to threat actors

December 1, 2025 3 min read
Aisuru Botnet Adopts Residential Proxy Revenue Model
cybersecurity tech news security

Aisuru Botnet Adopts Residential Proxy Revenue Model

Aisuru cybercriminals abandon denial-of-service attacks to commercialize IoT botnet as residential proxy infrastructure, renting IP anonymization and geographic distribution to threat actors

November 30, 2025 3 min read
Qilin Ransomware Exploits Korean MSP for Mass Attacks
cybersecurity tech news security

Qilin Ransomware Exploits Korean MSP for Mass Attacks

Qilin ransomware operators compromise South Korean managed service provider infrastructure to deploy encryption payloads across multiple financial institutions through trusted supply chain access

November 29, 2025 3 min read
Shai-Hulud Spreads from NPM to Maven Package Repos
cybersecurity tech news security

Shai-Hulud Spreads from NPM to Maven Package Repos

Shai-Hulud supply chain campaign extends beyond NPM to target Maven Central repositories, poisoning Java dependencies to steal credentials and secrets from enterprise development environments

November 29, 2025 3 min read
Aisuru Transforms IoT Botnet into Commercial Proxies
cybersecurity tech news security

Aisuru Transforms IoT Botnet into Commercial Proxies

Aisuru cybercriminals shift from distributed denial-of-service to residential proxy commercialization, monetizing compromised IoT infrastructure by selling anonymization services to other threat actors

November 29, 2025 3 min read
Shai-Hulud v2 Supply Chain Attack Exfiltrates Secrets
cybersecurity tech news security

Shai-Hulud v2 Supply Chain Attack Exfiltrates Secrets

Shai-Hulud v2 campaign expands from NPM to Maven repositories, deploying malicious packages that harvest thousands of API keys, credentials, and secrets from compromised development environments

November 28, 2025 3 min read
Aisuru Botnet Pivots to Proxy Service Subscriptions
cybersecurity tech news security

Aisuru Botnet Pivots to Proxy Service Subscriptions

Aisuru operators abandon DDoS operations for residential proxy subscription model, renting compromised IoT device access to cybercriminals requiring IP rotation and geographic anonymization capabilities

November 28, 2025 3 min read
Qilin Ransomware Targets South Korean Financial MSP
cybersecurity tech news security

Qilin Ransomware Targets South Korean Financial MSP

Qilin ransomware operators compromise South Korean managed service provider to deploy ransomware across multiple financial sector clients, exploiting supply chain trust relationships for mass encryption

November 27, 2025 3 min read