Malware Alerts
-
Mustang Panda, a China-linked threat actor, uses the SnakeDisk USB worm and updated TONESHELL backdoors to target Thailand-based IPs, deploying the Yokai backdoor for remote access. Learn about their evolving malware tactics and focus on Thailand.
-
Cybercriminals use X’s AI assistant Grok to bypass ad restrictions and distribute malware through hidden links, reaching millions. Learn about the “Grokking” technique and its impact.
-
Hackers are exploiting macOS security features like Keychain, TCC, SIP, and Gatekeeper to spread malware. Learn how to detect and prevent these advanced macOS attacks.
-
Discover how Sindoor Dropper malware uses weaponized .desktop files to infect Linux systems via spear-phishing and deploys MeshAgent RAT.
-
Discover how the TamperedChef malware uses a fake PDF editor to steal login credentials and sensitive data in a widespread 2025 cyberattack.
-
Discover how a malicious Go module masquerading as an SSH brute-force tool exfiltrates credentials to a Telegram bot. Learn about its key features and the threat it poses.
-
Zimperium’s zLabs has uncovered a new variant of the Hook Android banking trojan, featuring ransomware-style overlays and advanced credential theft tactics. Learn about its key features and technical insights.
-
Adversaries are misusing AI-powered website builders like Lovable to create malicious infrastructure for malware distribution and credential phishing. Discover the emerging threats and how organizations can protect themselves.
-
Discover PhantomCard, a sophisticated NFC-based Trojan targeting banking customers in Brazil. Learn how this malware exploits NFC relay attacks to steal sensitive card data and facilitate unauthorized transactions.
-
Discover how RingReaper, a sophisticated malware strain, targets Linux environments and evades traditional endpoint detection and response systems using advanced techniques. Learn about its impact on security.