Cyware Social
will be sunset on April 15, 2026. The service is being replaced by
Cyware's Daily Threat Intel Briefs,
offering curated security advisories on the latest threats. Enterprise users can contact us
here → for more details.
Threat actors continue to experiment with new delivery techniques and social engineering lures to distribute malware and gain persistent access to systems. In one campaign, North Korea-linked actors have been exploiting the VS C ...
Read More
Cybercriminal campaigns are increasingly combining automation, large-scale data theft, and sophisticated social engineering techniques to maximize impact. In one campaign, researchers uncovered an OpenCLAW AI bot operation hoste ...
Read More
Cybercriminal activity continues to evolve as attackers combine social engineering with increasingly advanced malware capabilities. A recent campaign targeting users across the Middle East and Africa uses fake shipment notificat ...
Read More
Cybercriminals are continuing to refine both delivery tactics and evasion techniques to infiltrate systems more effectively. One recent campaign involves the BeatBanker Android banking trojan being disguised as a fake Starlink m ...
Read More
Threat actors are increasingly blending social engineering with specialized malware to compromise systems and monetize attacks. In one example, Termite ransomware intrusions have been traced back to ClickFix social engineering c ...
Read More
The global threat landscape is witnessing a convergence of sophisticated state-sponsored espionage, deceptive social engineering, and a critical push for enterprise-wide patching. In South America, the China-linked actor UAT-9244 ...
Read More
The software supply chain and mobile ecosystems are facing a wave of high-precision exploitation. On the Packagist registry, malicious PHP packages have been found embedding a cross-platform RAT that targets Laravel environments. ...
Read More
The threat landscape is witnessing a rapid diversification of delivery methods, ranging from regional espionage to viral social media lures and search engine exploitation. In South Asia, the threat actor SloppyLemming has escalat ...
Read More
Financially motivated and hybrid threat operations continue to demonstrate increasing sophistication across intrusion and monetization tactics. In one case, the mercenary actor Akula infiltrated a financial institution using adv ...
Read More
Mobile and network-focused threats are evolving rapidly, with adversaries refining stealth and persistence techniques. Researchers identified the Dohdoor malware campaign, which leverages DNS-over-HTTPS tunneling to conceal C2 c ...
Read More