MALWARE 99
- ShadowHS - A Fileless Linux Post‑Exploitation Framework Built on a Weaponized hackshell
- GoTo Resolve Tool’s Background Activities Compared to Ransomware Tactics
- Can you use too many LOLBins to drop some RATs?
- Kimwolf Botnet Lurking in Corporate, Govt. Networks
- New PDFSider Windows malware deployed on Fortune 100 firm's network
- From Extension to Infection - An In-Depth Analysis of the Evelyn Stealer Campaign Targeting Software Developers
- Gootloader now uses 1,000-part ZIP archives for stealthy delivery
- Unveiling VoidLink – A Stealthy, Cloud-Native Linux Malware Framework
- Hunting Lazarus - Inside the Contagious Interview C2 Infrastructure
- CastleLoader Analysis - A Deep Dive into Stealthy Loader Targeting Government Sector
- CrazyHunter ransomware escalates with advanced intrusion tactics, six Taiwan healthcare victims confirmed
- Fake WinRAR downloads hide malware behind a real installer
- Inside GoBruteforcer - AI-Generated Server Defaults, Weak Passwords, and Crypto-Focused Campaigns
- Black Cat Behind SEO Poisoning Malware Campaign Targeting Popular Software Searches
- Hospitality Sector Hit By PHALT#BLYX ClickFix Malware Campaign
- Hackers Abuse Popular Monitoring Tool Nezha as a Stealth Trojan
- Cloud Atlas activity in the first half of 2025 what changed
- Rudepanda Owns Iis Servers Like 2003
- New BeaverTail Malware Variant Linked to Lazarus Group
- ShadyPanda - The Silent Browser Takeover Threat and How Qualys TruRisk Eliminate Helps You Stop It
- New SantaStealer malware steals data from browsers, crypto wallets
- NANOREMOTE, cousin of FINALDRAFT
- New JS#SMUGGLER Campaign Drops NetSupport RAT Through Infected Sites
- ChrimeraWire Trojan Fakes Chrome Activity to Manipulate Search Rankings
- To Catch a Predator Leak exposes the internal operations of Intellexa’s mercenary spyware
- Glassworm malware returns in third wave of malicious VS Code packages
- Shai-hulud 2.0 Campaign Targets Cloud and Developer Ecosystems
- Is Your Android TV Streaming Box Part of a Botnet?
- AI's scary new trick - Conducting cyberattacks instead of just helping out
- Hackers are Weaponizing Invoices to Deliver XWorm That Steals Login Credentials
- Google sounds alarm on self-modifying AI malware
- New "Brash" Exploit Crashes Chromium Browsers Instantly with a Single Malicious URL
- Qilin ransomware escalates rapidly in 2025, targeting critical sectors with 700 attacks amid RansomHub shutdown
- LockBit 5.0 Actively Attacking Windows, Linux, and ESXi Environments
- Agenda Ransomware Deploys Linux Variant on Windows Systems Through Remote Management Tools and BYOVD Techniques
- SocGholish Malware Using Compromised Sites to Deliver Ransomware
- Vidar Stealer 2.0 adds multi-threaded data theft, better evasion
- New .NET CAPI Backdoor Targets Russian Auto and E-Commerce Firms via Phishing ZIPs
- Hacker Group TA585 Emerges With Advanced Attack Infrastructure
- Researchers Warn RondoDox Botnet is Weaponizing Over 50 Flaws Across 30+ Vendors
- Gamaredon X Turla collab
- EvilAI malware campaign exploits AI-generated code to breach global critical sectors
- DNV details ‘SteganoAmor’ malware campaign used against Iranian oil and gas traders, extends to maritime operators
- New Buterat Backdoor Malware Found in Enterprise and Government Networks
- 18 Popular Code Packages Hacked, Rigged to Steal Crypto
- RapperBot Hijacking Devices to Launch DDoS Attack In a Split Second
- New Report on Commercial Spyware Vendors Detailing Their Targets and Infection Chains
- New Phishing Campaign Abuses ConnectWise ScreenConnect to Take Over Devices
- AI-Powered Ransomware Has Arrived With 'PromptLock'
- Fake macOS Help Sites Seek to Spread Infostealer in Targeted Campaign
- ClickFix Attack Tricks AI Summaries Into Pushing Malware
- Hackers Using New QuirkyLoader Malware to Spread Agent Tesla, AsyncRAT and Snake Keylogger
- New Ransomware Charon Uses Earth Baxia APT Techniques to Target Enterprises
- Malvertising campaign leads to PS1Bot, a multi-stage malware framework
- Shared secret EDR killer in the kill chain
- Makop Ransomware Identified in Attacks in South Korea
- New Plague Linux malware stealthily maintains SSH access
- AI-Generated Malicious npm Package Drains Solana Funds from 1,500+ Before Takedown
- RAVEN STEALER UNMASKED Telegram-Based Data Exfiltration
- Surveillance Malware Hidden in npm and PyPI Packages Targets Developers with Keyloggers, Webcam Capture, and Credential Theft
- The Rise of Acreed Infostealer in the Post-LummaC2 Threat Landscape
- Coyote in the Wild First-Ever Malware That Abuses UI Automation
- Back to Business Lumma Stealer Returns with Stealthier Methods
- Malware Identified in Attacks Exploiting Ivanti Connect Secure Vulnerabilities
- Getting to the Crux (Ransomware) of the Matter
- WordPress Redirect Malware Hidden in Google Tag Manager Code
- Threat hunting case study Lumma infostealer
- GhostContainer backdoor malware compromising Exchange servers of high-value organizations in Asia
- Old Miner, New Tricks H2miner Resurfaces with Lcrypt0rx Ransomware
- KongTuke FileFix Leads to New Interlock RAT Variant
- OCTALYN STEALER UNMASKED
- macOS.ZuRu Resurfaces | Modified Khepri C2 Hides Inside Doctored Termius App
- Malware of the Day – Multi-Modal C2 Communication – Numinon C2
- GreyNoise Identifies New Scraper Botnet Concentrated in Taiwan
- GitHub Abused to Spread Malware Disguised as Free VPN
- NordDragonScan Quiet Data-Harvester on Windows
- Digging Gold with a Spoon – Resurgence of Monero-mining Malware
- June's Dark Gift The Rise of Qwizzserial
- Stealthy WordPress Malware Drops Windows Trojan via PHP Backdoor
- Odyssey Stealer The Rebrand of Poseidon Stealer
- In the Wild Malware Prototype with Embedded Prompt Injection
- Resurgence of the Prometei Botnet
- Part 2 Tracking LummaC2 Infrastructure
- Cobalt Strike Operators Leverage PowerShell Loaders Across Chinese, Russian, and Global Infrastructure
- Fake Minecraft mods distributed by the Stargazers Ghost Network to steal gamers’ data
- JSFireTruck Exploring Malicious JavaScript Using JSF*ck as an Obfuscation Technique
- Fog Ransomware Unusual Toolset Used in Recent Attack
- Toxic trend Another malware threat targets DeepSeek
- The FBI Issued a Warning About This Malware That's Infecting Millions of Devices
- Blitz Malware A Tale of Game Cheats and Code Repositories
- Newly identified wiper malware “PathWiper” targets critical infrastructure in Ukraine
- From open-source to open threat Tracking Chaos RAT’s evolution
- Acreed Emerges as Dominant Infostealer Threat Following Lumma Takedown
- Interlock ransomware what you need to know
- Tracking LummaC2 Infrastructure with Cats
- Deep Dive into a Dumped Malware without a PE Header
- Malware or LLM? Silent Werewolf employs new loaders to attack Russian and Moldovan organizations
- SilverRAT Source Code Leaked Online Here’s What You Need to Know
- Reborn in Rust AsyncRAT