What Attackers Are Doing With Them
When an organization's credentials are leaked, the immediate consequences are rarely visible—but…
SocGholish Malware Spread via Ad Tools; Delivers Access to LockBit, Evil Corp, and Others
Aug 07, 2025Ravie LakshmananMalware / Threat Intelligence The threat actors behind the…
CERT-UA Warns of HTA-Delivered C# Malware Attacks Using Court Summons Lures
Aug 06, 2025Ravie LakshmananCyber Espionage / Malware The Computer Emergency Response Team…
ClickFix Malware Campaign Exploits CAPTCHAs to Spread Cross-Platform Infections
Aug 05, 2025Ravie LakshmananSocial Engineering / Malware A combination of propagation methods,…
Attackers Use Fake OAuth Apps with Tycoon Kit to Breach Microsoft 365 Accounts
Cybersecurity researchers have detailed a new cluster of activity where threat actors…
Experts Detect Multi-Layer Redirect Tactic Used to Steal Microsoft 365 Login Credentials
Jul 31, 2025Ravie LakshmananPhishing / Threat Intelligence Cybersecurity researchers have disclosed details…
PyPI Warns of Ongoing Phishing Campaign Using Fake Verification Emails and Lookalike Domain
Jul 29, 2025Ravie LakshmananPhishing / Developer Security The maintainers of the Python…
CastleLoader Malware Infects 469 Devices Using Fake GitHub Repos and ClickFix Phishing
Jul 24, 2025Ravie LakshmananMalware / Cybercrime Cybersecurity researchers have shed light on…
Cyber Espionage Campaign Hits Russian Aerospace Sector Using EAGLET Backdoor
Jul 25, 2025Ravie LakshmananCyber Espionage / Malware Russian aerospace and defense industries…


