MALWARE 36
- Malware Identified in Attacks Exploiting Ivanti Connect Secure Vulnerabilities
- Getting to the Crux (Ransomware) of the Matter
- WordPress Redirect Malware Hidden in Google Tag Manager Code
- Threat hunting case study Lumma infostealer
- GhostContainer backdoor malware compromising Exchange servers of high-value organizations in Asia
- Old Miner, New Tricks H2miner Resurfaces with Lcrypt0rx Ransomware
- KongTuke FileFix Leads to New Interlock RAT Variant
- OCTALYN STEALER UNMASKED
- macOS.ZuRu Resurfaces | Modified Khepri C2 Hides Inside Doctored Termius App
- Malware of the Day – Multi-Modal C2 Communication – Numinon C2
- GreyNoise Identifies New Scraper Botnet Concentrated in Taiwan
- GitHub Abused to Spread Malware Disguised as Free VPN
- NordDragonScan Quiet Data-Harvester on Windows
- Digging Gold with a Spoon – Resurgence of Monero-mining Malware
- June's Dark Gift The Rise of Qwizzserial
- Stealthy WordPress Malware Drops Windows Trojan via PHP Backdoor
- Odyssey Stealer The Rebrand of Poseidon Stealer
- In the Wild Malware Prototype with Embedded Prompt Injection
- Resurgence of the Prometei Botnet
- Part 2 Tracking LummaC2 Infrastructure
- Cobalt Strike Operators Leverage PowerShell Loaders Across Chinese, Russian, and Global Infrastructure
- Fake Minecraft mods distributed by the Stargazers Ghost Network to steal gamers’ data
- JSFireTruck Exploring Malicious JavaScript Using JSF*ck as an Obfuscation Technique
- Fog Ransomware Unusual Toolset Used in Recent Attack
- Toxic trend Another malware threat targets DeepSeek
- The FBI Issued a Warning About This Malware That's Infecting Millions of Devices
- Blitz Malware A Tale of Game Cheats and Code Repositories
- Newly identified wiper malware “PathWiper” targets critical infrastructure in Ukraine
- From open-source to open threat Tracking Chaos RAT’s evolution
- Acreed Emerges as Dominant Infostealer Threat Following Lumma Takedown
- Interlock ransomware what you need to know
- Tracking LummaC2 Infrastructure with Cats
- Deep Dive into a Dumped Malware without a PE Header
- Malware or LLM? Silent Werewolf employs new loaders to attack Russian and Moldovan organizations
- SilverRAT Source Code Leaked Online Here’s What You Need to Know
- Reborn in Rust AsyncRAT