Fake Tech Support Spam Deploys Customized Havoc C2 Across Organizations
Threat hunters have called attention to a new campaign as part of…
The 3 Steps CISOs Must Follow
Every CISO knows the uncomfortable truth about their Security Operations Center: the…
ScarCruft Uses Zoho WorkDrive and USB Malware to Breach Air-Gapped Networks
Ravie LakshmananFeb 27, 2026Malware / Surveillance The North Korean threat actor known…
Malicious Go Crypto Module Steals Passwords, Deploys Rekoobe Backdoor
Ravie LakshmananFeb 27, 2026Malware / Linux Security Cybersecurity researchers have disclosed details…
ClawJacked Flaw Lets Malicious Sites Hijack Local OpenClaw AI Agents via WebSocket
OpenClaw has fixed a high-severity security issue that, if successfully exploited, could…
Trojanized Gaming Tools Spread Java-Based RAT via Browser and Chat Platforms
Ravie LakshmananFeb 27, 2026Endpoint Security / Windows Security Threat actors are luring…
UAT-10027 Targets U.S. Education and Healthcare with Dohdoor Backdoor
Ravie LakshmananFeb 26, 2026Malware / Threat Intelligence A previously undocumented threat activity…
Google Disrupts UNC2814 GRIDTIDE Campaign After 53 Breaches Across 42 Countries
Ravie LakshmananFeb 25, 2026Cyber Espionage / Network Security Google on Wednesday disclosed…
Malicious NuGet Packages Stole ASP.NET Data; npm Package Dropped Malware
Ravie LakshmananFeb 25, 2026Cybersecurity / Malware Cybersecurity researchers have discovered four malicious…


