Hackers Use GitHub Repositories to Host Amadey Malware and Data Stealers, Bypassing Filters
Jul 17, 2025Ravie LakshmananMalware / Social Engineering Threat actors are leveraging public…
Hackers Leverage Microsoft Teams to Spread Matanbuchus 3.0 Malware to Targeted Firms
Jul 16, 2025Ravie LakshmananThreat Intelligence / Vulnerability Cybersecurity researchers have flagged a…
DanaBot malware operators exposed via C2 bug added in 2022
A vulnerability in the DanaBot malware operation introduced in June 2022 update led…
U.S. DoJ Seizes 4 Domains Supporting Cybercrime Crypting Services in Global Operation
May 31, 2025Ravie LakshmananMalware / Cyber Crime A multinational law enforcement operation…
Golden Chickens Deploy TerraStealerV2 to Steal Browser Credentials and Crypto Wallet Data
The threat actors known as Golden Chickens have been attributed to two…
Fake CAPTCHA Campaign Spreads Lumma Stealer in Multi-Industry Attacks
Jan 23, 2025Ravie LakshmananPhishing / Malware Cybersecurity researchers are calling attention to…
New PEAKLIGHT Dropper Deployed in Attacks Targeting Windows with Malicious Movie Downloads
Aug 23, 2024Ravie LakshmananMalware / Threat Intelligence Cybersecurity researchers have uncovered a…
New macOS Malware “Cthulhu Stealer” Targets Apple Users’ Data
Aug 23, 2024Ravie LakshmananEndpoint Security / Data Privacy Cybersecurity researchers have uncovered…