A new Mirai-based botnet malware called ShadowV2 was indeed active during the major AWS outage on October 20, 2025, with evidence suggesting its operators used the disruption as a test run for future attack...
SIO's Spyrtacus surveillanceware compromises Android devices via fake apps and cloned Italian telecom sites, stealing communications and media since 2018....
ShinyHunters: Vishing-led OAuth abuse hits Salesforce; coordinated extortion and data exfiltration target tech, retail, aviation. Defenses and IOCs inside....
Comprehensive analysis of Brass Typhoon (APT41/Barium), China's dual-purpose cyber threat actor combining state espionage with cybercrime operations....
BlackSuit ransomware analysis: Royal's successor demanding $500M+ ransoms. Comprehensive threat intelligence on tactics, victims, and defenses. ...
Scattered Spider's technical tactics: social engineering, cloud exploits, ransomware ops, and advanced defense evasion
Explore how China's Flax Typhoon group targets global critical infrastructure, using stealthy tactics to conduct cyber espionage and disrupt national security...
Explore an in-depth technical analysis of FireScam—a stealthy Android malware posing as Telegram Premium. Learn about its phishing distribution, multi-stage infection, data exfiltration via Firebase, and effective defense strategies to protect your mobile ecosystem...
Explore detailed analysis of advanced fileless malware RevC2, More_eggs Lite, and PSLoramyra. Understand their tactics, IOCs, and protection strategies. ...
Interlock ransomware is a cross-platform threat targeting critical infrastructure using double-extortion tactics. Learn about its methods and impacts...
Sign up to our Weekley Threat Digest and keep apace of the trends shaping Cybersecurity.