Explore an in-depth technical analysis of FireScam—a stealthy Android malware posing as Telegram Premium. Learn about its phishing distribution, multi-stage infection, data exfiltration via Firebase, and effective defense strategies to protect your mobile ecosystem...
Explore detailed analysis of advanced fileless malware RevC2, More_eggs Lite, and PSLoramyra. Understand their tactics, IOCs, and protection strategies. ...
Interlock ransomware is a cross-platform threat targeting critical infrastructure using double-extortion tactics. Learn about its methods and impacts...
Explore Fabrice malware: a Python typosquatting supply chain attack targeting AWS credentials across Linux & Windows via the compromised fabric library......
Explore ToxicPanda, a new banking trojan spreading from Asia to Europe and LATAM. Learn how it exploits Android devices for on-device fraud and RAT capabilities...
Explore the resurgence of the Necro Trojan, its infiltration of Google Play, and how it uses advanced steganography & obfuscation to infect Android a...
Voldemort Malware exploits Google Sheets for espionage, blending cybercrime with trusted platforms in a sophisticated hybrid campaign targeting global organizations… ...
Explore how Rafel RAT exploits vulnerabilities in outdated Android devices, orchestrating sophisticated ransomware attacks globally.
Unfading Sea Haze, a new cyberespionage group, targets South China Sea nations
Discover the sophisticated Latrodectus malware, the advanced successor to IcedID, in our latest research. Explore its capabilities, evolution, and technical analysis. ...
Sign up to our Weekley Threat Digest and keep apace of the trends shaping Cybersecurity.