Threat actors are sharpening stealth and precision across financial and espionage operations. The Contagious Interview campaign is covertly compromising MetaMask browser wallets by injecting malicious code that alters transactio ...
Read More
The cyber threat landscape continues to intensify as sophisticated actors refine their tactics and expand their targets. In one notable campaign, the financially driven Operation Doppelbrand has set its sights on Fortune 500 com ...
Read More
When deception becomes the delivery mechanism, even routine troubleshooting and meeting invites can turn into attack vectors. The Matryoshka ClickFix campaign is targeting macOS users by convincing them to execute malicious term ...
Read More
Sometimes the most dangerous threats hide behind tools users trust every day. Security researchers uncovered a wave of AI-themed malicious extensions on Google Chrome that amassed over 300,000 installations while covertly siphon ...
Read More
When trust becomes the attack surface, even routine professional interactions can turn into intrusion vectors. A highly targeted fake recruiter campaign is luring cryptocurrency developers with seemingly legitimate interview opp ...
Read More
Old tactics are proving just as dangerous as new ones in today’s threat landscape. A recently identified Linux botnet known as SSHStalker is exploiting exposed SSH services and relying on legacy IRC-based C2 infrastructure. In p ...
Read More
Attackers are refining their tactics by abusing trust, combining phishing, legitimate platforms, and email authentication loopholes to amplify their reach. The Phorpiex botnet is actively distributing phishing emails containing ...
Read More
From quiet surveillance to loud extortion, threat actors are operating across the full spectrum of cyber aggression. An unidentified state-backed adversary is running long-running Shadow espionage campaigns spanning 155 countrie ...
Read More
From fake voicemails to weaponized Office files, threat actors are getting creative. China-linked Mustang Panda (aka Bronze President or Earth Preta) is targeting diplomatic and geopolitical entities with tailored lures that cul ...
Read More
Security controls weren’t bypassed; they were sidestepped. Silver Fox APT is distributing ValleyRAT via a trojanized LINE installer, stealing credentials while evading detection using PoolParty-style code injection and Microsoft ...
Read More