Threat actors are increasingly blending social engineering with specialized malware to compromise systems and monetize attacks. In one example, Termite ransomware intrusions have been traced back to ClickFix social engineering c ...
Read More
The global threat landscape is witnessing a convergence of sophisticated state-sponsored espionage, deceptive social engineering, and a critical push for enterprise-wide patching. In South America, the China-linked actor UAT-9244 ...
Read More
The software supply chain and mobile ecosystems are facing a wave of high-precision exploitation. On the Packagist registry, malicious PHP packages have been found embedding a cross-platform RAT that targets Laravel environments. ...
Read More
The threat landscape is witnessing a rapid diversification of delivery methods, ranging from regional espionage to viral social media lures and search engine exploitation. In South Asia, the threat actor SloppyLemming has escalat ...
Read More
Financially motivated and hybrid threat operations continue to demonstrate increasing sophistication across intrusion and monetization tactics. In one case, the mercenary actor Akula infiltrated a financial institution using adv ...
Read More
Mobile and network-focused threats are evolving rapidly, with adversaries refining stealth and persistence techniques. Researchers identified the Dohdoor malware campaign, which leverages DNS-over-HTTPS tunneling to conceal C2 c ...
Read More
State-aligned and financially motivated threat actors continue to intensify targeted intrusion campaigns across multiple regions. In one such operation, the group GrayCharlie has been leveraging phishing lures and weaponized dow ...
Read More
Escalating cyber operations continue to demonstrate both technical sophistication and expanding targeting scope. Researchers recently identified widespread campaigns involving the Winos 4.0 malware, which are aimed at organizati ...
Read More
Artificial intelligence is rapidly reshaping the cyber threat landscape, giving attackers new tools to scale and refine their operations. A clear example is PromptSpy, identified by ESET researchers, which represents a new class ...
Read More
Cybercrime operations are expanding across illicit mining, financial fraud, and mobile malware ecosystems. A newly uncovered cryptojacking campaign is leveraging trojanized pirated software installers to trigger a multi-stage in ...
Read More