Malware Mobile Security2 Min Read March 20, 2026 Apple Warns Older iPhones Vulnerable to Coruna, DarkSword Exploit Kit Attacks Apple is urging users who are still running an outdated version of iOS to update their iPhones to secure against web-based attacks carried out…
Malware Mobile Security3 Min Read March 19, 2026 New Perseus Android Banking Malware Monitors Notes Apps to Extract Sensitive Data Cybersecurity researchers have disclosed a new Android malware family called Perseus that's being actively distributed in the wild with an aim…
Cryptocurrency Malware3 Min Read March 16, 2026 GlassWorm Attack Uses Stolen GitHub Tokens to Force-Push Malware Into Python Repos The GlassWorm malware campaign is being used to fuel an ongoing attack that leverages the stolen GitHub tokens to inject malware into hundreds…
Malware Threat Intelligence4 Min Read March 14, 2026 GlassWorm Supply-Chain Attack Abuses 72 Open VSX Extensions to Target Developers Cybersecurity researchers have flagged a new iteration of the GlassWorm campaign that they say represents a "significant escalation" in how it…
Malware VPN Security2 Min Read March 13, 2026 Storm-2561 Spreads Trojan VPN Clients via SEO Poisoning to Steal Credentials Microsoft has disclosed details of a credential theft campaign that employs fake virtual private network (VPN) clients distributed through…
Malware Threat Hunting6 Min Read March 13, 2026 Investigating a New Click-Fix Variant Disclaimer: This report has been prepared by the Threat Research Center to enhance cybersecurity awareness and support the strengthening of…
Cybercrime Malware3 Min Read March 12, 2026 Rust-Based VENON Malware Targets 33 Brazilian Banks with Credential-Stealing Overlays Cybersecurity researchers have disclosed details of a new banking malware targeting Brazilian users that's written in Rust, marking a…
Artificial Intelligence Malware3 Min Read March 12, 2026 Hive0163 Uses AI-Assisted Slopoly Malware for Persistent Access in Ransomware Attacks Cybersecurity researchers have disclosed details of a suspected artificial intelligence (AI)-generated malware codenamed Slopoly put to use by…
Malware Threat Intelligence3 Min Read March 5, 2026 Dust Specter Targets Iraqi Officials with New SPLITDROP and GHOSTFORM Malware A suspected Iran-nexus threat actor has been attributed to a campaign targeting government officials in Iraq by impersonating the country's…
Malware Windows Security3 Min Read March 4, 2026 APT41-Linked Silver Dragon Targets Governments Using Cobalt Strike and Google Drive C2 Cybersecurity researchers have disclosed details of an advanced persistent threat (APT) group dubbed Silver Dragon that has been linked to…
Linux Security Malware2 Min Read February 27, 2026 Malicious Go Crypto Module Steals Passwords, Deploys Rekoobe Backdoor Cybersecurity researchers have disclosed details of a malicious Go module that's designed to harvest passwords, create persistent access via…
Malware Surveillance3 Min Read February 27, 2026 ScarCruft Uses Zoho WorkDrive and USB Malware to Breach Air-Gapped Networks The North Korean threat actor known as ScarCruft has been attributed to a fresh set of tools, including a backdoor that uses Zoho WorkDrive…
Blockchain Malware4 Min Read February 26, 2026 Aeternum C2 Botnet Stores Encrypted Commands on Polygon Blockchain to Evade Takedown Cybersecurity researchers have disclosed details of a new botnet loader called Aeternum C2 that uses a blockchain-based command-and-control…
Malware Threat Intelligence2 Min Read February 26, 2026 UAT-10027 Targets U.S. Education and Healthcare with Dohdoor Backdoor A previously undocumented threat activity cluster has been attributed to an ongoing malicious campaign targeting education and healthcare…
Malware Supply Chain Attack5 Min Read February 26, 2026 Microsoft Warns Developers of Fake Next.js Job Repos Delivering In-Memory Malware A "coordinated developer-targeting campaign" is using malicious repositories disguised as legitimate Next.js projects and technical…
Malware Vulnerability3 Min Read February 24, 2026 UnsolicitedBooker Targets Central Asian Telecoms With LuciDoor and MarsSnake Backdoors The threat activity cluster known as UnsolicitedBooker has been observed targeting telecommunications companies in Kyrgyzstan and Tajikistan,…
Malware Threat Intelligence2 Min Read February 20, 2026 ClickFix Campaign Abuses Compromised Sites to Deploy MIMICRAT Malware Cybersecurity researchers have disclosed details of a new ClickFix campaign that abuses compromised legitimate sites to deliver a previously…
Malware Mobile Security3 Min Read February 19, 2026 PromptSpy Android Malware Abuses Gemini AI to Automate Recent-Apps Persistence Cybersecurity researchers have discovered what they say is the first Android malware that abuses Gemini, Google's generative artificial…
Malware Threat Intelligence6 Min Read February 15, 2026 Microsoft Discloses DNS-Based ClickFix Attack Using Nslookup for Malware Staging Microsoft has disclosed details of a new version of the ClickFix social engineering tactic in which the attackers trick unsuspecting users…
Malware Threat Intelligence2 Min Read February 13, 2026 Google Ties Suspected Russian Actor to CANFAIL Malware Attacks on Ukrainian Orgs A previously undocumented threat actor has been attributed to attacks targeting Ukrainian organizations with malware known as CANFAIL. Google…
Critical Infrastructure Malware4 Min Read February 13, 2026 Google Links China, Iran, Russia, North Korea to Coordinated Defense Sector Cyber Operations Several state-sponsored actors, hacktivist entities, and criminal groups from China, Iran, North Korea, and Russia have trained their sights…
Endpoint Security Malware5 Min Read February 10, 2026 Reynolds Ransomware Embeds BYOVD Driver to Disable EDR Security Tools Cybersecurity researchers have disclosed details of an emergent ransomware family dubbed Reynolds that comes embedded with a built-in bring…
IoT Security Malware3 Min Read February 6, 2026 China-Linked DKnife AitM Framework Targets Routers for Traffic Hijacking, Malware Delivery Cybersecurity researchers have taken the wraps off a gateway-monitoring and adversary-in-the-middle (AitM) framework dubbed DKnife that's…
Cyber Espionage Malware3 Min Read February 6, 2026 Asian State-Backed Group TGR-STA-1030 Breaches 70 Government, Infrastructure Entities A previously undocumented cyber espionage group operating from Asia broke into the networks of at least 70 government and critical…
Developer Security Malware4 Min Read February 6, 2026 Compromised dYdX npm and PyPI Packages Deliver Wallet Stealers and RAT Malware Cybersecurity researchers have discovered a new supply chain attack in which legitimate packages on npm and the Python Package Index (PyPI)…
Cyber Espionage Malware4 Min Read February 5, 2026 Infy Hackers Resume Operations with New C2 Servers After Iran Internet Blackout Ends The elusive Iranian threat group known as Infy (aka Prince of Persia) has evolved its tactics as part of efforts to hide its tracks, even as…
Endpoint Security Malware3 Min Read February 4, 2026 DEAD#VAX Malware Campaign Deploys AsyncRAT via IPFS-Hosted VHD Phishing Files Threat hunters have disclosed details of a new, stealthy malware campaign dubbed DEAD#VAX that employs a mix of "disciplined tradecraft and…
Malware Threat Intelligence5 Min Read February 4, 2026 China-Linked Amaranth-Dragon Exploits WinRAR Flaw in Espionage Campaigns Threat actors affiliated with China have been attributed to a fresh set of cyber espionage campaigns targeting government and law enforcement…
Malware Vulnerability3 Min Read February 3, 2026 APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks The Russia-linked state-sponsored threat actor known as APT28 (aka UAC-0001) has been attributed to attacks exploiting a newly disclosed…
Malware Threat Intelligence2 Min Read February 2, 2026 Notepad++ Official Update Mechanism Hijacked to Deliver Malware to Select Users The maintainer of Notepad++ has revealed that state-sponsored attackers hijacked the utility's update mechanism to redirect update traffic to…
Developer Tools Malware3 Min Read February 2, 2026 Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm Cybersecurity researchers have disclosed details of a supply chain attack targeting the Open VSX Registry in which unidentified threat actors…
AI Security Malware6 Min Read January 30, 2026 Researchers Uncover Chrome Extensions Abusing Affiliate Links and Stealing ChatGPT Access Cybersecurity researchers have discovered malicious Google Chrome extensions that come with capabilities to hijack affiliate links, steal…
Malware Threat Intelligence6 Min Read January 29, 2026 Google Disrupts IPIDEA — One of the World’s Largest Residential Proxy Networks Google on Wednesday announced that it worked together with other partners to disrupt IPIDEA, which it described as one of the largest…
AI Security Malware4 Min Read January 28, 2026 Fake Moltbot AI Coding Assistant on VS Code Marketplace Drops Malware Cybersecurity researchers have flagged a new malicious Microsoft Visual Studio Code (VS Code) extension for Moltbot (formerly Clawdbot) on the…
Ad Fraud Malware3 Min Read December 31, 2025 DarkSpectre Browser Extension Campaigns Exposed After Impacting 8.8 Million Users Worldwide The threat actor behind two malicious browser extension campaigns, ShadyPanda and GhostPoster, has been attributed to a third attack campaign…
Cybersecurity Malware3 Min Read December 31, 2025 Researchers Spot Modified Shai-Hulud Worm Testing Payload on npm Registry Cybersecurity researchers have disclosed details of what appears to be a new strain of Shai Hulud on the npm registry with slight…
Malware Phishing3 Min Read December 30, 2025 Silver Fox Targets Indian Users With Tax-Themed Emails Delivering ValleyRAT Malware The threat actor known as Silver Fox has turned its focus to India, using income tax-themed lures in phishing campaigns to distribute a…
Cyber Espionage Malware4 Min Read December 30, 2025 Mustang Panda Uses Signed Kernel-Mode Rootkit to Load TONESHELL Backdoor The Chinese hacking group known as Mustang Panda has leveraged a previously undocumented kernel-mode rootkit driver to deliver a new variant…
Endpoint Security Malware2 Min Read December 24, 2025 New MacSync macOS Stealer Uses Signed App to Bypass Apple Gatekeeper Cybersecurity researchers have discovered a new variant of a macOS information stealer called MacSync that's delivered by means of a digitally…
Malware Open Source3 Min Read December 22, 2025 Fake WhatsApp API Package on npm Steals Messages, Contacts, and Login Tokens Cybersecurity researchers have disclosed details of a new malicious package on the npm repository that works as a fully functional WhatsApp…
Cyber Espionage Malware3 Min Read December 21, 2025 Iranian Infy APT Resurfaces with New Malware Activity After Years of Silence Threat hunters have discerned new activity associated with an Iranian threat actor known as Infy (aka Prince of Persia), nearly five years…
Cloud Security Malware3 Min Read December 18, 2025 China-Aligned Threat Group Uses Windows Group Policy to Deploy Espionage Malware A previously undocumented China-aligned threat cluster dubbed LongNosedGoblin has been attributed to a series of cyber attacks targeting…