|
Copyright Lures Mask a Multi-Stage PureLog Stealer Attack on Key Industries
|
2026-04-19 |
22 |
|
Inside a network of 20,000+ fake shops
|
2026-04-17 |
0 |
|
A Deep Dive Into Attempted Exploitation of CVE-2023-33538
|
2026-04-17 |
0 |
|
Takes Aim at the Ransomware Throne
|
2026-04-17 |
2 |
|
Analysis of the Spear-Phishing and KakaoTalk-Linked Threat Campaign
|
2026-04-17 |
14 |
|
Contagious Trader campaign - Coordinated weaponisation of cryptocurrency trading bots by suspected DPRK malware operators
|
2026-04-17 |
12 |
|
Operation Roundish: Uncovering an APT28 Roundcube Exploitation Toolkit Targeting Ukraine
|
2026-04-17 |
10 |
|
Casting a Wider Net: Scaling Threat
|
2026-04-17 |
12 |
|
Direct-Sys Loader and CGrabber Stealer Five-Stage Malware Chain
|
2026-04-17 |
109 |
|
Dissecting macOS intrusion from lure to compromise
|
2026-04-17 |
22 |
|
Beyond the breach: inside a cargo theft actor's post-compromise playbook
|
2026-04-16 |
22 |
|
New backdoor targeting Ukrainian entities with possible links to Laundry Bear
|
2026-04-16 |
58 |
|
Hydra Saiga: Covert Espionage and Infiltration of Critical Utilities
|
2026-04-16 |
43 |
|
CVE-2026-39987 update: How attackers weaponized marimo to deploy a blockchain botnet via HuggingFace
|
2026-04-16 |
3 |
|
Boggy Serpens Threat Assessment
|
2026-04-16 |
0 |
|
Fake YouTube copyright notices can steal your Google login
|
2026-04-15 |
5 |
|
Silent Crypto Wallet Takeover Unlimited USDT Approval Exploitation via Trust Wallet QR Code Phishing
|
2026-04-15 |
4 |
|
From fake Proton VPN sites to gaming mods, this Windows infostealer is everywhere
|
2026-04-15 |
8 |
|
The n8n n8mare: How threat actors are misusing AI workflow automation
|
2026-04-15 |
15 |
|
Chasing an Angry Spark
|
2026-04-15 |
17 |
|
COVERT RAT: Phishing Campaign
|
2026-04-15 |
15 |
|
A new Mac stealer targeting $10K+ crypto wallets
|
2026-04-15 |
15 |
|
New ransomware targets Turkey via Adwind RAT
|
2026-04-15 |
5 |
|
Suspected China-Based Espionage Operation Against Military Targets in Southeast Asia
|
2026-04-15 |
0 |
|
Storm-2561 uses SEO poisoning to distribute fake VPN clients for credential theft
|
2026-04-15 |
43 |
|
China-nexus Threat Actor Targets Persian Gulf Region With PlugX
|
2026-04-15 |
28 |
|
Investigating a new Click-fix variant
|
2026-04-15 |
7 |
|
MAAS VIP_Keylogger Campaign
|
2026-04-15 |
16 |
|
Web Shells, Tunnels, and Ransomware: Dissecting a Warlock Attack
|
2026-04-15 |
17 |
|
108 Chrome Extensions Linked to Data Exfiltration and Session Theft via Shared C2 Infrastructure
|
2026-04-14 |
40 |
|
59 Victims, Zero Authentication: A ClickFix Campaign Force-Installs a Chrome Extension Banking Stealer and Leaves the Entire C2 Wide Open
|
2026-04-14 |
19 |
|
March 2026 CVE Landscape: 31 High-Impact Vulnerabilities Identified, Interlock Ransomware Group Exploits Cisco FMC Zero-Day
|
2026-04-14 |
0 |
|
Q1 2026 Malware Statistics Report for Windows Database Servers
|
2026-04-14 |
13 |
|
Q1 2026 Malware Statistics Report for Linux SSH Servers
|
2026-04-14 |
2 |
|
Pretexting-Based Targeted Intrusion: Analysis of Facebook Reconnaissance and Software Tampering Attacks
|
2026-04-14 |
21 |
|
ASO RAT: Arabic-Language Android Surveillance Platform Targeting Syria
|
2026-04-13 |
2 |
|
REFUNDEE: Inside a Shadow Panel Phishing-as-a-Service Operation
|
2026-04-13 |
37 |
|
Fake recruiter campaign targets crypto developers with RAT
|
2026-04-13 |
319 |
|
Live C2 Dump Recovering Every Stage of the Kill Chain: CHM Dropper, VBScript Stager, PowerShell Keylogger
|
2026-04-13 |
47 |
|
Polymarket Trader Funds at Risk: DPRK npm Package Steals Wallet Keys and Installs SSH Backdoor
|
2026-04-13 |
6 |
|
A new Android RAT turning infected devices into potential residential proxy nodes
|
2026-04-13 |
4 |
|
Threat Actors Leverage Claude Code Leak as Social Engineering Lure to Distribute Malicious Payloads via GitHub
|
2026-04-13 |
20 |
|
Threat Actor Targets Arabian Gulf Region With PlugX
|
2026-04-13 |
31 |
|
Tracking MiniDionis: CozyCar's New Ride Is Related to Seaduke
|
2026-04-13 |
0 |
|
CPU-Z & HWMonitor, cpuid.com, Watering Hole Attack
|
2026-04-13 |
43 |
|
RondoDox Botnet: From Zero to 174 Exploited Vulnerabilities
|
2026-04-10 |
0 |
|
Stolen Service Accounts Lead to Rogue Workstations and Deep AD Compromise
|
2026-04-10 |
0 |
|
CastleRAT attack first to abuse Deno JavaScript runtime to evade enterprise security
|
2026-04-10 |
6 |
|
Payroll pirate attacks targeting Canadian employees
|
2026-04-10 |
0 |
|
KadNap Malware Turning Asus Routers Into Botnets
|
2026-04-10 |
2 |