MALWARE 78
- UK calls out Russian military intelligence for use of espionage tool
- Malware Identified in Attacks Exploiting Ivanti Connect Secure Vulnerabilities
- CERT-UA Discovers LAMEHUG Malware Linked to APT28, Using LLM for Phishing Campaign
- WordPress Redirect Malware Hidden in Google Tag Manager Code
- Threat hunting case study Lumma infostealer
- The Linuxsys Cryptominer
- GhostContainer backdoor malware compromising Exchange servers of high-value organizations in Asia
- On the Move Fast Flux in the Modern Threat Landscape
- Konfety Returns Classic Mobile Threat with New Evasion Techniques
- KongTuke FileFix Leads to New Interlock RAT Variant
- Contagious Interview Campaign Escalates With 67 Malicious npm Packages and New Malware Loader
- OCTALYN STEALER UNMASKED
- macOS.ZuRu Resurfaces | Modified Khepri C2 Hides Inside Doctored Termius App
- Malware of the Day – Multi-Modal C2 Communication – Numinon C2
- Fix the Click Preventing the ClickFix Attack Vector
- Code highlighting with Cursor AI for $500,000
- GitHub Abused to Spread Malware Disguised as Free VPN
- Attackers Inject Code into WordPress Theme to Redirect Visitors
- Researchers Reveal 18 Malicious Chrome and Edge Extensions Disguised as Everyday Tools
- From Click to Compromise Unveiling the Sophisticated Attack of DoNot APT Group on Southern European Government Entities
- Digging Gold with a Spoon – Resurgence of Monero-mining Malware
- Deploying NetSupport RAT via WordPress & ClickFix
- Batavia spyware steals data from Russian organizations
- Phishing Attack Deploying Malware on Indian Defense BOSS Linux
- When Installers Turn Evil The Pascal Script Behind Inno Setup Malware Campaign
- macOS NimDoor | DPRK Threat Actors Target Web3 and Crypto Platforms with Nim-Based Malware
- Gamaredon in 2024 Cranking out spearphishing campaigns against Ukraine with an evolved toolset
- Stealthy WordPress Malware Drops Windows Trojan via PHP Backdoor
- Odyssey Stealer The Rebrand of Poseidon Stealer
- Odyssey Stealer The Rebrand of Poseidon Stealer
- GIFTEDCROOK’s Strategic Pivot From Browser Stealer to Data Exfiltration Platform During Critical Ukraine Negotiations
- In the Wild Malware Prototype with Embedded Prompt Injection
- Russia-linked APT28 use Signal chats to target Ukraine official with malware
- SparkKitty, SparkCat’s little brother A new Trojan spy found in the App Store and Google Play
- ConnectUnwise Threat actors abuse ConnectWise as builder for signed malware
- Androxgh0st Continues Exploitation Operators Compromise a US University For Hosting C2 Logger
- Resurgence of the Prometei Botnet
- Part 2 Tracking LummaC2 Infrastructure
- Fake Minecraft mods distributed by the Stargazers Ghost Network to steal gamers’ data
- Report Links Los Pollos and RichAds to Malware Traffic Operations
- PyPI, npm, and AI Tools Exploited in Malware Surge Targeting DevOps and Cloud Environments
- Fileless AsyncRAT Distributed Via Clickfix Technique Targeting German Speaking Users
- Clone, Compile, Compromise Water Curse’s Open-Source Malware Trap on GitHub
- From Trust to Threat Hijacked Discord Invites Used for Multi-Stage Malware Delivery
- Don't Get Caught in the Headlights - DeerStealer Analysis
- Toxic trend Another malware threat targets DeepSeek
- Unmasking the Infrastructure of a Spearphishing Campaign
- The Evolution of Linux Binaries in Targeted Cloud Operations
- Two Botnets, One Flaw Mirai Spreads Through Wazuh Vulnerability
- The FBI Issued a Warning About This Malware That's Infecting Millions of Devices
- Operation DRAGONCLONE Chinese Telecommunication industry targeted via VELETRIX & VShell malware
- Blitz Malware A Tale of Game Cheats and Code Repositories
- Operation Endgame Disrupts AvCheck, Forces Threat Actors to Seek Alternatives
- ClickFix Attack Exploits Fake Cloudflare Turnstile to Deliver Malware
- BladedFeline Whispering in the dark
- Android Spyware Alert! Fake government app targeting Android users in India!
- Abusing Paste.ee to Deploy XWorm and AsyncRAT Across Global C2 Infrastructure
- The strange tale of ischhfd83 When cybercriminals eat their own
- From open-source to open threat Tracking Chaos RAT’s evolution
- Fake WordPress Caching Plugin Used to Steal Admin Credentials
- Android malware trends Stealthier, easier-to-use
- The Rising Tide Understanding the Surge in Cyber Attacks in India
- How Threat Actors Exploit Human Trust A Breakdown of the 'Prove You Are Human' Malware Scheme
- Crocodilus Mobile Malware Evolving Fast, Going Global
- Victims risk AsyncRAT infection after being redirected to fake Booking.com sites
- Malicious Ruby Gems Exfiltrate Telegram Tokens and Messages Following Vietnam Ban
- Hackers Weaponize Free SSH Client PuTTY to Deliver Malware on Windows
- Alleged Conti, TrickBot Gang Leader Unmasked
- Monkey-Patched PyPI Packages Use Transitive Dependencies to Steal Solana Private Keys
- Emulating the Unyielding Scattered Spider
- Cybercriminals camouflaging threats as AI tool installers
- Zanubis in motion Tracing the active evolution of the Android banking malware
- Pakistan Telecommunication Company (PTCL) Targeted by Bitter APT During Heightened Regional Conflict
- Mark Your Calendar APT41 Innovative Tactics
- The Sharp Taste of Mimo’lette Analyzing Mimo’s Latest Campaign targeting Craft CMS
- Text-to-Malware How Cybercriminals Weaponize Fake AI-Themed Websites
- DragonForce actors target SimpleHelp vulnerabilities to attack MSP, customers
- Reborn in Rust AsyncRAT