Investigating a New Click-Fix Variant
Disclaimer: This report has been prepared by the Threat Research Center to…
GlassWorm Supply-Chain Attack Abuses 72 Open VSX Extensions to Target Developers
Cybersecurity researchers have flagged a new iteration of the GlassWorm campaign that…
Chinese Hackers Target Southeast Asian Militaries with AppleChris and MemFun Malware
A suspected China-based cyber espionage operation has targeted Southeast Asian military organizations…
Storm-2561 Spreads Trojan VPN Clients via SEO Poisoning to Steal Credentials
Ravie LakshmananMar 13, 2026VPN Security / Malware Microsoft has disclosed details of…
Rust-Based VENON Malware Targets 33 Brazilian Banks with Credential-Stealing Overlays
Ravie LakshmananMar 12, 2026Malware / Cybercrime Cybersecurity researchers have disclosed details of…
Attackers Don’t Just Send Phishing Emails. They Weaponize Your SOC’s Workload
The most dangerous phishing campaigns aren’t just designed to fool employees. Many…
UNC6426 Exploits nx npm Supply-Chain Attack to Gain AWS Admin Access in 72 Hours
Ravie LakshmananMar 11, 2026DevSecOps / AI Security A threat actor known as…
FortiGate Devices Exploited to Breach Networks and Steal Service Account Credentials
Ravie LakshmananMar 10, 2026Network Security / Vulnerability Cybersecurity researchers are calling attention…
UNC4899 Breached Crypto Firm After Developer AirDropped Trojanized File to Work Device
Ravie LakshmananMar 09, 2026DevOps / Threat Intelligence The North Korean threat actor…


