| Operation DualScript: Multi-Stage PowerShell Malware Targets | 2026-03-31 | cryptocurrency, retrorat, multi-stage, powershell | 12 |
| One Click Away: Inside a LinkedIn Phishing Attack | 2026-03-31 | credential theft, social engineering, email spoofing, notification imitation | 3 |
| CrySome RAT : An Advanced Persistent .NET Remote Access Troj | 2026-03-31 | rat, .net, stealth, c# | 8 |
| Phantom Footprints: Tracking GhostSocks Malware | 2026-03-31 | c2 infrastructure, ghostsocks, evasion techniques, socks5 | 10 |
| New widespread EvilTokens kit: device code phishing as-a-ser | 2026-03-31 | device code phishing, token harvesting, microsoft 365, phishing-as-a-service | 33 |
| Supply-Chain Compromise of axios npm Package | 2026-03-31 | remote-access-trojan, credential-theft, axios, cross-platform | 12 |
| WhatsApp malware campaign delivers VBScript and MSI backdoor | 2026-03-31 | cloud-based, social-engineering, uac-bypass, remote-access | 22 |
| Operation TrueChaos: 0-Day Exploitation Against Southeast As | 2026-03-31 | southeast asia, havoc, zero-day, trueconf | 3 |
| TeamPCP’s Telnyx Attack Marks a Shift in Tactics Beyond Lite | 2026-03-30 | base64 encoding, pypi, persistence, steganography | 7 |
| BreachForums Data Leaks: Technical Analysis and Timeline Att | 2026-03-28 | timeline attribution, data leaks, mybb, forum infrastructure | 13 |
| Telnyx Python SDK Compromised to Deliver Credential-Stealing | 2026-03-28 | telnyx, supply-chain-attack, hybrid-encryption, fileless-execution | 3 |
| A cunning predator: How Silver Fox preys on Japanese firms t | 2026-03-28 | targeted attacks, valleyrat, financial lures, hr lures | 79 |
| Security brief: tax scams aim to steal funds from taxpayers | 2026-03-30 | tax scams, bec, valleyrat, winos4.0 | 19 |
| Malicious Go 'crypto' Module Steals Passwords and Deploys Re | 2026-02-27 | cryptography-impersonation, rekoobe, supply-chain-attack, linux-malware | 15 |
| Disrupting the GRIDTIDE Global Cyber Espionage Campaign | 2026-02-26 | cyber espionage, google sheets, gridtide, china | 181 |
| AitM Phishing Targets TikTok Business Accounts Using Cloudfl | 2026-03-27 | aura stealer, tiktok, credential theft, phishing | 10 |
| AI Infrastructure Supply Chain Poisoning Alert | 2026-03-27 | software security, supply chain attack, open source, credential theft | 6 |
| The Latest PlugX Variant Executed by STATICPLUGIN | 2026-02-25 | rc4-encryption, apt, targeted-attack, plugx | 14 |
| Infiniti Stealer: a new macOS infostealer using ClickFix and | 2026-03-27 | infostealer, infiniti stealer, clickfix, macos | 4 |
| Inside Keitaro Abuse Part 2: One Platform, Many Threats | 2026-03-27 | rustystealer, screenconnect, phishing, keitaro | 103 |
| BRUSHWORM and BRUSHLOGGER uncovered | 2026-03-27 | keylogger, brushworm, brushlogger | 7 |
| The Certificate Decoding Illusion: How Blank Grabber Stealer | 2026-03-27 | xworm, information stealer, blankgrabber | 5 |
| Converging Interests: Analysis of Threat Clusters Targeting | 2026-03-27 | cl-sta-1048, eggstremefuel, cl-sta-1049, coolclient | 50 |
| EtherRAT & SYS_INFO Module: C2 on Ethereum (EtherHiding), Ta | 2026-03-26 | sys_info module, backdoor, cdn-like beaconing, ethereum | 22 |
| Pawn Storm Campaign Deploys PRISMEX, Targets Government and | 2026-03-26 | prismex, prismexstager, nato, notdoor | 175 |