MALWARE 54
- RapperBot Hijacking Devices to Launch DDoS Attack In a Split Second
- New Report on Commercial Spyware Vendors Detailing Their Targets and Infection Chains
- New Phishing Campaign Abuses ConnectWise ScreenConnect to Take Over Devices
- AI-Powered Ransomware Has Arrived With 'PromptLock'
- Fake macOS Help Sites Seek to Spread Infostealer in Targeted Campaign
- ClickFix Attack Tricks AI Summaries Into Pushing Malware
- Hackers Using New QuirkyLoader Malware to Spread Agent Tesla, AsyncRAT and Snake Keylogger
- New Ransomware Charon Uses Earth Baxia APT Techniques to Target Enterprises
- Malvertising campaign leads to PS1Bot, a multi-stage malware framework
- Shared secret EDR killer in the kill chain
- Makop Ransomware Identified in Attacks in South Korea
- New Plague Linux malware stealthily maintains SSH access
- AI-Generated Malicious npm Package Drains Solana Funds from 1,500+ Before Takedown
- RAVEN STEALER UNMASKED Telegram-Based Data Exfiltration
- Surveillance Malware Hidden in npm and PyPI Packages Targets Developers with Keyloggers, Webcam Capture, and Credential Theft
- The Rise of Acreed Infostealer in the Post-LummaC2 Threat Landscape
- Coyote in the Wild First-Ever Malware That Abuses UI Automation
- Back to Business Lumma Stealer Returns with Stealthier Methods
- Malware Identified in Attacks Exploiting Ivanti Connect Secure Vulnerabilities
- Getting to the Crux (Ransomware) of the Matter
- WordPress Redirect Malware Hidden in Google Tag Manager Code
- Threat hunting case study Lumma infostealer
- GhostContainer backdoor malware compromising Exchange servers of high-value organizations in Asia
- Old Miner, New Tricks H2miner Resurfaces with Lcrypt0rx Ransomware
- KongTuke FileFix Leads to New Interlock RAT Variant
- OCTALYN STEALER UNMASKED
- macOS.ZuRu Resurfaces | Modified Khepri C2 Hides Inside Doctored Termius App
- Malware of the Day – Multi-Modal C2 Communication – Numinon C2
- GreyNoise Identifies New Scraper Botnet Concentrated in Taiwan
- GitHub Abused to Spread Malware Disguised as Free VPN
- NordDragonScan Quiet Data-Harvester on Windows
- Digging Gold with a Spoon – Resurgence of Monero-mining Malware
- June's Dark Gift The Rise of Qwizzserial
- Stealthy WordPress Malware Drops Windows Trojan via PHP Backdoor
- Odyssey Stealer The Rebrand of Poseidon Stealer
- In the Wild Malware Prototype with Embedded Prompt Injection
- Resurgence of the Prometei Botnet
- Part 2 Tracking LummaC2 Infrastructure
- Cobalt Strike Operators Leverage PowerShell Loaders Across Chinese, Russian, and Global Infrastructure
- Fake Minecraft mods distributed by the Stargazers Ghost Network to steal gamers’ data
- JSFireTruck Exploring Malicious JavaScript Using JSF*ck as an Obfuscation Technique
- Fog Ransomware Unusual Toolset Used in Recent Attack
- Toxic trend Another malware threat targets DeepSeek
- The FBI Issued a Warning About This Malware That's Infecting Millions of Devices
- Blitz Malware A Tale of Game Cheats and Code Repositories
- Newly identified wiper malware “PathWiper” targets critical infrastructure in Ukraine
- From open-source to open threat Tracking Chaos RAT’s evolution
- Acreed Emerges as Dominant Infostealer Threat Following Lumma Takedown
- Interlock ransomware what you need to know
- Tracking LummaC2 Infrastructure with Cats
- Deep Dive into a Dumped Malware without a PE Header
- Malware or LLM? Silent Werewolf employs new loaders to attack Russian and Moldovan organizations
- SilverRAT Source Code Leaked Online Here’s What You Need to Know
- Reborn in Rust AsyncRAT