A sophisticated phishing campaign linked to North Korean threat actors is abusing GitHub as a covert … GitHub C2 LNK Phishing Attack Linked to North Korea Read more
Windows security
Hackers Weaponize Legitimate Windows Tools to Disable Antivirus Before Ransomware Attacks
Ransomware attacks have evolved far beyond simple malicious payloads. Modern threat actors now rely on legitimate … Hackers Weaponize Legitimate Windows Tools to Disable Antivirus Before Ransomware AttacksRead more
CharlieKirk Grabber Stealer: How Windows Systems Are Targeted for Credential Theft
In February 2026, cybersecurity researchers uncovered a new Python-based infostealer, CharlieKirk Grabber, actively targeting Windows systems. … CharlieKirk Grabber Stealer: How Windows Systems Are Targeted for Credential TheftRead more
ClickFix Attack Abuses nslookup.exe for DNS Payload Delivery
Threat actors are evolving the ClickFix attack playbook—and this time, they’re weaponizing a trusted Windows utility: … ClickFix Attack Abuses nslookup.exe for DNS Payload DeliveryRead more
SolyxImmortal Malware: A Stealthy Python-Based Threat Targeting Windows Systems
In January 2026, researchers identified a new Python-based malware strain named SolyxImmortal—a silent, persistent, and highly … SolyxImmortal Malware: A Stealthy Python-Based Threat Targeting Windows SystemsRead more
Windows RasMan Vulnerability: CVE-2025-59230 Exploit Chain Explained
Privilege escalation vulnerabilities remain a top concern for enterprise security teams. In October 2025, Microsoft patched … Windows RasMan Vulnerability: CVE-2025-59230 Exploit Chain ExplainedRead more