Daily Cybersecurity Roundup

Iranian hackers are on a roll, with UNC1549 deploying advanced malware families like TWOSTROKE and DEEPROOT to penetrate aerospace, aviation, and defense networks across the Middle East. At the same time, IRGC-IO–linked operator ... Read More
Just when you think the dragon is asleep, it breathes fire again, and DragonBreath APT proved it by unleashing RONINGLOADER to slip in an upgraded gh0st RAT while quietly disabling Windows Defender through PPL abuse. Meanwhile, ... Read More
A recent wave of threats highlights evolving attacker tactics: a Formbook campaign is distributing phishing emails with ZIP attachments containing obfuscated VBS scripts to trigger infections, while operators of the Contagious I ... Read More
Even when you think the RATs are gone, they somehow find their way back. The notorious DarkComet RAT, long discontinued by its creator, has resurfaced through a new malware campaign that hides behind fake Bitcoin tools to infect ... Read More
A surge of malicious activity has been observed across the cyber landscape. Maverick malware is targeting Brazil’s largest banks, hijacking browser sessions and propagating through WhatsApp Web. Meanwhile, researchers have uncov ... Read More
Looks like the GlassWorm is back to burrow through developer ecosystems again—this time wriggling into the OpenVSX marketplace with malicious VSCode extensions that have already snared over 10,000 downloads. Meanwhile, researche ... Read More
Phishing remains a top attack vector, enabling threat actors to breach networks through deceptive emails and messages. Russia-linked InedibleOchotense used phishing and Signal messages to deliver trojanized ESET installers deplo ... Read More
Russia’s notorious Sandworm group has slithered back into action, launching destructive cyberattacks on Ukraine’s grain and other industries using data-wiping malware like ZeroLot and Sting to cripple operations. In parallel, a ... Read More
Attackers are demonstrating incredible range, hitting novel AI infrastructure, decentralized finance, and personal mobile apps. Researchers revealed a sophisticated backdoor named SesameOp, which cleverly exploits OpenAI's API fo ... Read More
Cybercriminals are proving adept at turning trusted infrastructure against its users, from enterprise software to the phone in your pocket. A newly discovered Windows malware named Airstalk is now exploiting the AirWatch API for ... Read More

Get the Daily Cybersecurity Roundup delivered to your email!

Recent Blogs
Daily Threat Briefing