Darkness Ransomware

Darkness Ransomware Darkness ransomware is a newly identified malicious strain designed to encrypt user files and demand payment for their…

ITFunk Research
5 Min Read

“Spotify: We Can’t Process Your Payment” Phishing Scam

Overview of the Scam The “Spotify: We Can’t Process Your Payment” phishing scam is a fraudulent email campaign designed to trick users…

ITFunk Research
4 Min Read

Qwizzserial Stealer

Qwizzserial is a Kotlin‑based Android stealer trojan that has infected nearly 100,000 devices—particularly in Uzbekistan—by masquerading as legitimate financial or…

ITFunk Research
2 Min Read

Ziver Ransomware

Ziver is a Makop-based ransomware, first spotted in July 2025, that encrypts user files and appends a unique ID, the developer’s…

ITFunk Research
3 Min Read

“Virus Intrusion Into Our Office 365 Webmail Server” Scam

The “Virus Intrusion Into Our Office 365 Webmail Server” Phishing Scam is a deceptive campaign designed to trick users into revealing their Microsoft…

ITFunk Research
4 Min Read

Sahara Airdrop Scam

The Sahara Airdrop Scam, also known as the Fake Sahara Airdrop, is a phishing/email scam that impersonates the legitimate Sahara AI platform,…

ITFunk Research
3 Min Read

“Hyperliquid Fee Refund” Scam

The Scam Website masquerading as a “Hyperliquid Fee Refund” service promises users a refund of blockchain fees—but it’s nothing more…

ITFunk Research
3 Min Read

Sinobi Ransomware

Sinobi is a newly discovered ransomware that encrypts personal and business files by appending the .SINOBI extension. It then locks you out…

ITFunk Research
3 Min Read

Identity and Access Management (IAM): Strengthening Business Cybersecurity

Learn how Identity and Access Management (IAM) enhances business cybersecurity by controlling user access and protecting sensitive data.

ITFunk Research
4 Min Read

Managed Detection and Response (MDR): A Smart Cybersecurity Move for Businesses

Discover how Managed Detection and Response (MDR) enhances business cybersecurity with 24/7 threat monitoring, detection, and response.

ITFunk Research
4 Min Read