TOITOIN Trojan: Advanced threat analysis, evasion techniques, and data exfiltration methods in Windows systems.
Dark Pink: A New APT Group Targeting Governmental and Military Organizations in APAC and Europe
A stealthy and targeted campaign by Volt Typhoon, a China-based state-sponsored actor, aiming to disrupt critical communications infrastructure between the US & Asia...
GobRAT is a sophisticated malware that poses a significant threat to Linux routers. With its unique characteristics and mode of operation, GobRAT has gained attention in the cybersecurity community...
Learn about Kimsuky's use of ReconShark, their global campaign implications, and effective countermeasures to protect your digital environment....
Balada Injector: A Comprehensive Threat Research on Ongoing WordPress Malware Campaign. Learn about the code scripts, IoCs, and in-depth technical analysis......
Discover the new Dark Power ransomware threat and learn how to protect your systems. Our threat research reveals its origin, behavior, and IoCs...
Learn about the MIRAi botnet and its devastating impact on IoT devices. Understand how to protect your devices and networks from this dangerous malware....
WhiskerSpy: A new backdoor malware disguised as browser extensions propagating via Watering Hole attack targeting users in Russia, Belarus, & Ukraine...
BOLDMOVE is a new Linux-based malware discovered in a China-based cyber espionage campaign that targets FortiOS devices. The malware is used to maintain persistence on exploited devices by patching the FortiOS logging processes and disabling logging altogether....
Sign up to our Weekley Threat Digest and keep apace of the trends shaping Cybersecurity.