Cryptocurrency users are increasingly being targeted by sophisticated malware campaigns that exploit trust in legitimate software … Fake Proxifier Installer on GitHub Spreads ClipBanker Crypto-Stealing MalwareRead more
fileless malware
APT37 Social Engineering Attack: Facebook, Telegram & Malware Chain
The APT37 social engineering attack marks a significant evolution in nation-state cyber operations—combining social media manipulation, … APT37 Social Engineering Attack: Facebook, Telegram & Malware ChainRead more
Copyright-Themed Lures Deliver Multi-Stage PureLog Stealer
A new credential theft campaign is leveraging copyright violation lures to distribute PureLog Stealer, a multi-stage … Copyright-Themed Lures Deliver Multi-Stage PureLog StealerRead more
PureLog Stealer Malware Delivered via Copyright-Themed Emails
Threat actors are increasingly using copyright-themed phishing emails to deliver sophisticated credential-stealing malware. The latest campaign … PureLog Stealer Malware Delivered via Copyright-Themed EmailsRead more
Phishing-Led Agent Tesla Campaign Evades Detection
Cybercriminals don’t always need zero-day exploits to succeed. In fact, many of today’s most damaging breaches … Phishing-Led Agent Tesla Campaign Evades DetectionRead more
MIMICRAT RAT Delivered via Sophisticated Multi-Stage ClickFix Campaign
A new custom remote access trojan (RAT) named MIMICRAT has been identified in a highly sophisticated … MIMICRAT RAT Delivered via Sophisticated Multi-Stage ClickFix CampaignRead more
Google Warns of Hackers Exploiting Gemini AI for Multi-Stage Malware
Google’s Threat Intelligence Group (GTIG) has revealed that threat actors are abusing Gemini AI to automate … Google Warns of Hackers Exploiting Gemini AI for Multi-Stage MalwareRead more
Fileless Malware: Why AI‑Driven Attacks Are So Hard to Stop
For years, defenders focused on detecting ransomware binaries before encryption began. But today’s attackers are no … Fileless Malware: Why AI‑Driven Attacks Are So Hard to StopRead more