Cybersecurity & AI Insights

Expert analysis from Ricnology

Nomani Scam Campaign Expands 62% Using AI Celebrity Fakes
cybersecurity tech news security

Nomani Scam Campaign Expands 62% Using AI Celebrity Fakes

Nomani investment fraud operation grows 62% through AI-generated deepfake celebrity endorsements on Facebook and YouTube, with ESET blocking 64,000 malicious URLs targeting cryptocurrency investors across social media platforms

December 29, 2025 3 min read
MacSync Stealer Abuses Apple Code Signing for Distribution
cybersecurity tech news security

MacSync Stealer Abuses Apple Code Signing for Distribution

MacSync information stealer variant distributes through Apple-notarized Swift applications, exploiting code signing trust mechanisms to bypass Gatekeeper protections while harvesting passwords and cryptocurrency wallet data

December 29, 2025 3 min read
Rey's Identity Revealed in Scattered LAPSUS$ Investigation
cybersecurity tech news security

Rey's Identity Revealed in Scattered LAPSUS$ Investigation

Digital forensics investigation reveals Rey's true identity as core administrator of Scattered LAPSUS$ Hunters criminal network, exposing operational security failures and linking attack infrastructure across multiple enterprise breaches

December 29, 2025 3 min read
Nomani Deepfake Scam Blocks 64,000 URLs on Social Platforms
cybersecurity tech news security

Nomani Deepfake Scam Blocks 64,000 URLs on Social Platforms

ESET blocks 64,000 malicious URLs linked to Nomani investment fraud campaign using AI-generated deepfake celebrity endorsements across Facebook and YouTube, representing 62% increase in fraudulent activity

December 28, 2025 3 min read
MacSync Malware Uses Apple Signatures to Evade Detection
cybersecurity tech news security

MacSync Malware Uses Apple Signatures to Evade Detection

MacSync information stealer exploits Apple's code signing infrastructure, leveraging notarized Swift applications disguised as messaging software to bypass Gatekeeper protections and harvest credentials

December 28, 2025 3 min read
Rey Exposed as Scattered LAPSUS$ Hunters Administrator
cybersecurity tech news security

Rey Exposed as Scattered LAPSUS$ Hunters Administrator

Security investigation exposes Rey's role as primary administrator of Scattered LAPSUS$ Hunters cybercrime operation, managing attack coordination, victim targeting, and criminal infrastructure operations

December 28, 2025 3 min read
Nomani Scam Grows 62% Targeting Facebook and YouTube Users
cybersecurity tech news security

Nomani Scam Grows 62% Targeting Facebook and YouTube Users

Nomani investment fraud campaign expands 62% across social platforms using AI deepfake technology, targeting Facebook and YouTube users with fake celebrity endorsements promoting fraudulent cryptocurrency schemes

December 27, 2025 3 min read
MacSync Stealer Exploits Notarized Apps to Bypass Gatekeeper
cybersecurity tech news security

MacSync Stealer Exploits Notarized Apps to Bypass Gatekeeper

MacSync malware variant leverages digitally signed and notarized Swift applications to evade Apple Gatekeeper detection, masquerading as legitimate messaging software to steal credentials and crypto assets

December 27, 2025 4 min read
Rey's Scattered LAPSUS$ Hunters Operational Role Confirmed
cybersecurity tech news security

Rey's Scattered LAPSUS$ Hunters Operational Role Confirmed

Forensic analysis confirms Rey's operational role managing Scattered LAPSUS$ Hunters attack infrastructure, coordinating social engineering operations and directing multi-target enterprise breach campaigns

December 27, 2025 3 min read
Nomani Deepfake Scams Target 64,000 Victims via Social Media
cybersecurity tech news security

Nomani Deepfake Scams Target 64,000 Victims via Social Media

Nomani cryptocurrency investment scam utilizes AI-generated deepfake celebrity endorsements to defraud thousands of victims across social media platforms, blocked 64,000 malicious URLs in 2025

December 26, 2025 3 min read
MacSync Stealer Abuses Apple-Signed Apps to Evade Detection
cybersecurity tech news security

MacSync Stealer Abuses Apple-Signed Apps to Evade Detection

MacSync information-stealing malware leverages digitally signed macOS applications to circumvent Apple Gatekeeper protections, exfiltrating sensitive credentials and financial data from compromised systems

December 26, 2025 3 min read
Rey Identified as Scattered LAPSUS$ Hunters Chief Operator
cybersecurity tech news security

Rey Identified as Scattered LAPSUS$ Hunters Chief Operator

Cybercrime analysis identifies Rey as chief technical operator of Scattered LAPSUS$ Hunters organization, revealing leadership structure and coordination methods for enterprise data breach campaigns

December 26, 2025 3 min read