fp-3a
-
Discover how the state-sponsored threat actor CL-STA-0969 targeted Southeast Asian telecom networks, deploying covert malware for remote access. Learn about their tactics and tools.
-
Discover how the Pakistan-linked APT36 group is targeting Indian railways and government systems using malicious PDF files. Learn about their sophisticated infection chains and phishing tactics.
-
Discover how phishing scams are targeting users through WhatsApp messages, including a recent HDFC Bank impersonation attempt. Learn how to protect yourself with FraudProtector.Net.
-
The maritime industry faces a surge in ransomware attacks from APT groups, with over 100 cyberattacks reported in the past year. Learn about the tactics used by hackers and the implications for global trade.
-
ToxicPanda, a sophisticated Android banking trojan, has infected over 4,500 devices in Europe, targeting banking apps to steal credentials. Learn about its techniques and impact.
-
A recent cyberattack on a US chemicals company exploited the SAP NetWeaver vulnerability CVE-2025-31324 to deploy Auto-Color malware. Learn about the attack details and key takeaways.
-
Discover Shuyal, a newly identified stealer malware targeting 19 browsers, including Tor and Brave. Learn how it extracts sensitive data and poses a significant threat to your security.
-
A single compromised password caused the downfall of KNP Logistics, a 158-year-old company, leaving 730 employees jobless. Learn about the Akira ransomware attack and its implications for UK businesses.
-
Discover the new Gunra ransomware targeting Windows systems, encrypting files, and deleting shadow copies. Learn about its origins, tactics, and how organizations can defend against this emerging threat.
-
A new malware campaign targets gamers by promoting fake indie games through YouTube and Discord, installing credential-stealing malware. Learn how this sophisticated attack operates and the variants involved.