Malware is evolving into a stealthier adversary, cloaking its communication channels and delivery mechanisms under layers of deception. I2PRAT, a newly discovered RAT, uses the I2P network for encrypted and anonymous communication. RiseLoader has emerged as a versatile loader, using a custom TCP protocol to deliver a range of secondary payloads like Vidar and Lumma Stealer. In parallel, cybercriminals have turned to spoofing Google Calendar emails in a phishing campaign targeting 300 organizations. Read on for the top 10 highlights from cyberspace.