Cybersecurity researchers have noted a rise in mass scanning and brute-forcing attempts originating from Proton66, a Russian bulletproof hosting service provider. These attempts, which started early 2025, have focused on organizations globally. Various malware families, including GootLoader and SpyNote use Proton66 for their command-and-control servers and phishing pages. Trustwave’s analysis has also revealed the use of compromised WordPress websites for directing Android device users to phishing pages mimicking Google Play for downloading harmful APK files.

4 common AI adoption roadblocks and how to avoid them
Generative AI can enhance patient experiences and health outcomes, but trust, accuracy, staff training, and the protection of intellectual property are hurdles to its implementation