A newly discovered variant of the ClickFix attack technique is actively targeting Windows users by abusing … New ClickFix Variant Uses Rundll32 and WebDAV to Evade PowerShell DetectionRead more
cybersecurity threat intelligence
Steaelite RAT and the Rise of Double-Extortion Cyberattacks Against Enterprises
In late 2025 and early 2026, security researchers began observing a surge in double‑extortion ransomware attacks … Steaelite RAT and the Rise of Double-Extortion Cyberattacks Against EnterprisesRead more
Zoom Update Scam Infects 1,437 Users in 12 Days
The latest Zoom update scam demonstrates how attackers are increasingly weaponizing trusted enterprise software to deploy … Zoom Update Scam Infects 1,437 Users in 12 DaysRead more
Critical BeyondTrust Vulnerability Enables Full Domain Takeover
A critical BeyondTrust vulnerability is actively being exploited in the wild — and attackers are using … Critical BeyondTrust Vulnerability Enables Full Domain TakeoverRead more
Single Threat Actor Drives 83% of Ivanti RCE Exploitation
A recent surge in remote code execution (RCE) attacks targeting Ivanti Endpoint Manager Mobile (EPMM) has … Single Threat Actor Drives 83% of Ivanti RCE ExploitationRead more