Ransomware in financial services has reached unprecedented levels in 2024, with 65% of financial organizations reporting … Ransomware in Financial Services: 65% Hit in 2024Read more
Threat Intelligence
China’s Dual Vulnerability Databases Create Disclosure Gaps
Global vulnerability management depends on one core principle: timely disclosure. But new research into China’s dual … China’s Dual Vulnerability Databases Create Disclosure GapsRead more
Ivanti EPMM Zero-Day Exploits Threaten Enterprises
The newly disclosed Ivanti EPMM zero-day vulnerabilities are being actively exploited in the wild, placing thousands … Ivanti EPMM Zero-Day Exploits Threaten EnterprisesRead more
Crypto Scam in Asia: Malvertising Meets Pig Butchering
A rapidly expanding cryptocurrency scam targeting Asia is blending two highly effective fraud models — malvertising … Crypto Scam in Asia: Malvertising Meets Pig ButcheringRead more
New ClickFix Variant Hijacks DNS to Deliver Malware
A new evolution of the ClickFix social engineering campaign has emerged, introducing a stealthy DNS-based staging … New ClickFix Variant Hijacks DNS to Deliver MalwareRead more
ORB Networks Exploit Compromised IoT Devices for Masked Cyberattacks
Cyberattackers are increasingly using obfuscated networks of compromised devices to evade detection. Known as Operational Relay … ORB Networks Exploit Compromised IoT Devices for Masked CyberattacksRead more
OpenClaw Supply Chain Attack: Malicious AI Skills Spread Infostealers
The rapid rise of AI agent platforms is creating a new and largely unprotected attack surface … OpenClaw Supply Chain Attack: Malicious AI Skills Spread InfostealersRead more
LLMjacking Exposed: How Attackers Hijack and Monetize AI Endpoints
Large Language Models (LLMs) are rapidly becoming core enterprise infrastructure—but attackers are already exploiting the weakest … LLMjacking Exposed: How Attackers Hijack and Monetize AI EndpointsRead more
Google Disrupts Massive Residential Proxy Networks Abusing User Devices
Residential proxy networks have quietly become one of the most abused infrastructures in modern cybercrime—and most … Google Disrupts Massive Residential Proxy Networks Abusing User DevicesRead more
GhostChat Spyware: How a Fake Dating App Spies on You
Mobile devices have become the most personal—and most vulnerable—computing platforms in modern organizations. From private conversations … GhostChat Spyware: How a Fake Dating App Spies on YouRead more