Malware Threat Intelligence2 Min Read February 2, 2026 Notepad++ Official Update Mechanism Hijacked to Deliver Malware to Select Users The maintainer of Notepad++ has revealed that state-sponsored attackers hijacked the utility's update mechanism to redirect update traffic to…
Endpoint Security Threat Intelligence3 Min Read February 2, 2026 eScan Antivirus Update Servers Compromised to Deliver Multi-Stage Malware The update infrastructure for eScan antivirus, a security solution developed by Indian cybersecurity company MicroWorld Technologies, has been…
Cybercrime Threat Intelligence10 Min Read January 30, 2026 Badges, Bytes and Blackmail Behind the scenes of law enforcement in cyber: what do we know about caught cybercriminals? What brought them in, where do they come from and…
Incident Response Threat Intelligence3 Min Read January 29, 2026 3 Decisions CISOs Need to Make to Prevent Downtime Risk in 2026 Beyond the direct impact of cyberattacks, enterprises suffer from a secondary but potentially even more costly risk: operational downtime, any…
Malware Threat Intelligence6 Min Read January 29, 2026 Google Disrupts IPIDEA — One of the World’s Largest Residential Proxy Networks Google on Wednesday announced that it worked together with other partners to disrupt IPIDEA, which it described as one of the largest…
Critical Infrastructure Threat Intelligence3 Min Read January 28, 2026 Russian ELECTRUM Tied to December 2025 Cyber Attack on Polish Power Grid The "coordinated" cyber attack targeting multiple sites across the Polish power grid has been attributed with medium confidence to a Russian…
Threat Intelligence Vulnerability3 Min Read January 28, 2026 Google Warns of Active Exploitation of WinRAR Vulnerability CVE-2025-8088 Google on Tuesday revealed that multiple threat actors, including nation-state adversaries and financially motivated groups, are exploiting a…
Cloud Security Threat Intelligence3 Min Read December 29, 2025 27 Malicious npm Packages Used as Phishing Infrastructure to Steal Login Credentials Cybersecurity researchers have disclosed details of what has been described as a "sustained and targeted" spear-phishing campaign that has…
Endpoint Security Threat Intelligence4 Min Read December 19, 2025 Cracked Software and YouTube Videos Spread CountLoader and GachiLoader Malware Cybersecurity researchers have disclosed details of a new campaign that has used cracked software distribution sites as a distribution vector…
Email Security Threat Intelligence2 Min Read December 17, 2025 APT28 Targets Ukrainian UKR-net Users in Long-Running Credential Phishing Campaign The Russian state-sponsored threat actor known as APT28 has been attributed to what has been described as a "sustained" credential-harvesting…
Endpoint Security Threat Intelligence5 Min Read December 17, 2025 Fix SOC Blind Spots: See Threats to Your Industry & Country in Real Time Modern security teams often feel like they're driving through fog with failing headlights. Threats accelerate, alerts multiply, and SOCs…
Threat Intelligence Vulnerability3 Min Read December 12, 2025 React2Shell Exploitation Escalates into Large-Scale Global Attacks, Forcing Emergency Mitigation The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has urged federal agencies to patch the recent React2Shell vulnerability by…
Cyberwarfare Threat Intelligence3 Min Read December 11, 2025 WIRTE Leverages AshenLoader Sideloading to Install the AshTag Espionage Backdoor An advanced persistent threat (APT) known as WIRTE has been attributed to attacks targeting government and diplomatic entities across the…
Identity theft Threat Intelligence3 Min Read December 2, 2025 Researchers Capture Lazarus APT's Remote-Worker Scheme Live on Camera A joint investigation led by Mauro Eldritch, founder of BCA LTD, conducted together with threat-intel initiative NorthScan and ANY.RUN, a…
Security Automation Threat Intelligence4 Min Read November 25, 2025 3 SOC Challenges You Need to Solve Before 2026 2026 will mark a pivotal shift in cybersecurity. Threat actors are moving from experimenting with AI to making it their primary weapon, using…
Malware Threat Intelligence5 Min Read November 21, 2025 APT24 Deploys BADAUDIO in Years-Long Espionage Hitting Taiwan and 1,000+ Domains A China-nexus threat actor known as APT24 has been observed using a previously undocumented malware dubbed BADAUDIO to establish persistent…
Cyber Warfare Threat Intelligence3 Min Read November 20, 2025 Iran-Linked Hackers Mapped Ship AIS Data Days Before Real-World Missile Strike Attempt Threat actors with ties to Iran engaged in cyber warfare as part of efforts to facilitate and enhance physical, real-world attacks, a trend…
Threat Intelligence Vulnerability2 Min Read November 19, 2025 NHS Warns of PoC Exploit for 7-Zip Symbolic Link–Based RCE Vulnerability Update: The NHS England Digital, in an updated advisory on November 20, 2025, said it has not observed in-the-wild exploitation of…
Threat Intelligence Vulnerability2 Min Read November 19, 2025 WrtHug Exploits Six ASUS WRT Flaws to Hijack Tens of Thousands of EoL Routers Worldwide A newly discovered campaign has compromised tens of thousands of outdated or end-of-life (EoL) ASUS routers worldwide, predominantly in…
Malware Threat Intelligence2 Min Read November 14, 2025 North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels The North Korean threat actors behind the Contagious Interview campaign have once again tweaked their tactics by using JSON storage services…
Malware Threat Intelligence3 Min Read November 14, 2025 Iranian Hackers Launch ‘SpearSpecter’ Spy Operation on Defense & Government Targets The Iranian state-sponsored threat actor known as APT42 has been observed targeting individuals and organizations that are of interest to the…
Ransomware Threat Intelligence4 Min Read November 14, 2025 Ransomware's Fragmentation Reaches a Breaking Point While LockBit Returns Key Takeaways: 85 active ransomware and extortion groups observed in Q3 2025, reflecting the most decentralized ransomware ecosystem to date.…
Threat Intelligence Vulnerability4 Min Read November 14, 2025 Now-Patched Fortinet FortiWeb Flaw Exploited in Attacks to Create Admin Accounts Cybersecurity researchers are sounding the alert about an authentication bypass vulnerability in Fortinet Fortiweb Web Application Firewall…
Browser Security Threat Intelligence2 Min Read November 13, 2025 Fake Chrome Extension “Safery” Steals Ethereum Wallet Seed Phrases Using Sui Blockchain Cybersecurity researchers have uncovered a malicious Chrome extension that poses as a legitimate Ethereum wallet but harbors functionality to…
Patch Management Threat Intelligence6 Min Read November 13, 2025 When Attacks Come Faster Than Patches: Why 2026 Will be the Year of Machine-Speed Security The Race for Every New CVE Based on multiple 2025 industry reports: roughly 50 to 61 percent of newly disclosed vulnerabilities saw exploit…
Compliance Threat Intelligence5 Min Read November 6, 2025 From Tabletop to Turnkey: Building Cyber Resilience in Financial Services Introduction Financial institutions are facing a new reality: cyber-resilience has passed from being a best practice, to an operational…
Data Security Threat Intelligence4 Min Read November 5, 2025 Why SOC Burnout Can Be Avoided: Practical Steps Behind every alert is an analyst; tired eyes scanning dashboards, long nights spent on false positives, and the constant fear of missing…
Malware Threat Intelligence3 Min Read October 31, 2025 China-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomats A China-affiliated threat actor known as UNC6384 has been linked to a fresh set of attacks exploiting an unpatched Windows shortcut…
Threat Intelligence Vulnerability3 Min Read October 31, 2025 CISA and NSA Issue Urgent Guidance to Secure WSUS and Microsoft Exchange Servers The U.S. Cybersecurity and Infrastructure Security Agency (CISA) and National Security Agency (NSA), along with international partners from…
Malware Threat Intelligence2 Min Read October 29, 2025 10 npm Packages Caught Stealing Developer Credentials on Windows, macOS, and Linux Cybersecurity researchers have discovered a set of 10 malicious npm packages that are designed to deliver an information stealer targeting…
SOC Operations Threat Intelligence4 Min Read October 28, 2025 Why Early Threat Detection Is a Must for Long-Term Business Growth In cybersecurity, speed isn't just a win — it's a multiplier. The faster you learn about emerging threats, the faster you adapt your…
Ransomware Threat Intelligence3 Min Read October 27, 2025 Qilin Ransomware Combines Linux Payload With BYOVD Exploit in Hybrid Attack The ransomware group known as Qilin (aka Agenda, Gold Feather, and Water Galura) has claimed more than 40 victims every month since the start…
Cyber Espionage Threat Intelligence2 Min Read October 23, 2025 North Korean Hackers Lure Defense Engineers With Fake Jobs to Steal Drone Secrets Threat actors with ties to North Korea have been attributed to a new wave of attacks targeting European companies active in the defense…
Threat Intelligence Vulnerability1 Min Read October 23, 2025 Critical Lanscope Endpoint Manager Bug Exploited in Ongoing Cyberattacks, CISA Confirms The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added a critical security flaw impacting Motex Lanscope Endpoint…
Cyber Espionage Threat Intelligence3 Min Read October 21, 2025 Google Identifies Three New Russian Malware Families Created by COLDRIVER Hackers A new malware attributed to the Russia-linked hacking group known as COLDRIVER has undergone numerous developmental iterations since May 2025,…
Data Security Threat Intelligence2 Min Read October 20, 2025 Five New Exploited Bugs Land in CISA's Catalog — Oracle and Microsoft Among Targets The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added five security flaws to its Known Exploited Vulnerabilities…
Cybercrime Threat Intelligence2 Min Read October 18, 2025 New .NET CAPI Backdoor Targets Russian Auto and E-Commerce Firms via Phishing ZIPs Cybersecurity researchers have shed light on a new campaign that has likely targeted the Russian automobile and e-commerce sectors with a…
Malware Threat Intelligence2 Min Read October 18, 2025 Silver Fox Expands Winos 4.0 Attacks to Japan and Malaysia via HoldingHands RAT The threat actors behind a malware family known as Winos 4.0 (aka ValleyRAT) have expanded their targeting footprint from China and Taiwan to…
Cyber Espionage Threat Intelligence3 Min Read October 15, 2025 Chinese Threat Group 'Jewelbug' Quietly Infiltrated Russian IT Network for Months A threat actor with ties to China has been attributed to a five-month-long intrusion targeting a Russian IT service provider, marking the…
Threat Intelligence Vulnerability2 Min Read October 15, 2025 F5 Breach Exposes BIG-IP Source Code — Nation-State Hackers Behind Massive Intrusion U.S. cybersecurity company F5 on Wednesday disclosed that unidentified threat actors broke into its systems and stole files containing some of…
Threat Intelligence Vulnerability1 Min Read October 12, 2025 New Oracle E-Business Suite Bug Could Let Hackers Access Data Without Login Oracle on Saturday issued a security alert warning of a fresh security flaw impacting its E-Business Suite that it said could allow…
SaaS Security Threat Intelligence1 Min Read October 10, 2025 Microsoft Warns of ‘Payroll Pirates’ Hijacking HR SaaS Accounts to Steal Employee Salaries A threat actor known as Storm-2657 has been observed hijacking employee accounts with the end goal of diverting salary payments to…