malware
-
DragonForce and Anubis Ransomware Gangs Launch New Affiliate Programs
Secureworks Counter Threat Unit (CTU) researchers have uncovered innovative strategies deployed by the DragonForce and Anubis ransomware operators in 2025.…
Read More » -
Threat Actors Leverage TAG-124 Infrastructure to Deliver Malicious Payloads
In a concerning trend for cybersecurity, multiple threat actors, including ransomware groups and state-sponsored entities, are utilizing a malicious traffic…
Read More » -
Hackers Exploit Cloudflare Tunnel Infrastructure to Deploy Multiple Remote Access Trojans
The Sekoia TDR (Threat Detection & Research) team has reported on a sophisticated network infrastructure named “Cloudflare tunnel infrastructure to…
Read More » -
Infostealer Attacks Surge 84% Weekly Through Phishing Emails
The volume of infostealer malware distributed through phishing emails has surged by 84% week-on-week in 2024, according to the latest…
Read More » -
Writing Effective Detection Rules With Sigma, YARA, and Suricata
In the ever-evolving world of cybersecurity, the ability to detect threats quickly and accurately is crucial for defending modern digital…
Read More » -
New Android SuperCard X Malware Uses NFC-Relay Technique for POS & ATM Transactions
A new malware strain known as SuperCard X has emerged, utilizing an innovative Near-Field Communication (NFC)-relay attack to execute unauthorized…
Read More » -
Chinese Nexus Hackers Exploit Ivanti Connect Secure Flaw to Gain Access
In a sophisticated cyber-espionage operation, a group known as UNC5221, suspected to have China-nexus, has exploited a critical vulnerability in…
Read More » -
10 Best Cloud Security Solutions 2025
In today’s digital era, businesses are increasingly adopting cloud computing to store data, run applications, and manage infrastructure. However, as…
Read More » -
10 Best Patch Management Tools in 2025
In today’s digital landscape, maintaining secure and efficient IT systems is critical for organizations. Patch management tools play a vital…
Read More » -
How To Detect Obfuscated Malware That Evades Static Analysis Tools
Obfuscated malware presents one of the most challenging threats in cybersecurity today. As static analysis tools have become standard components…
Read More »