
Month: September 2025
-
AsyncRAT Campaigns Uncovered: How Attackers Abuse ScreenConnect and Open Directories
This intelligence report details a sophisticated attack campaign leveraging trojanized ConnectWise ScreenConnect installers to deliver AsyncRAT payloads. Attackers use open…
-
AsyncRAT Campaigns Uncovered: How Attackers Abuse ScreenConnect and Open Directories
This intelligence report details a sophisticated attack campaign leveraging trojanized ConnectWise ScreenConnect installers to deliver AsyncRAT payloads. Attackers use open…
-
Malicious PyPI Packages Deliver SilentSync RAT
Two malicious Python packages, sisaws and secmeasure, were discovered in the Python Package Index (PyPI) repository. These packages, created by…
-
Malicious PyPI Packages Deliver SilentSync RAT
Two malicious Python packages, sisaws and secmeasure, were discovered in the Python Package Index (PyPI) repository. These packages, created by…
-
Malicious PyPI Packages Deliver SilentSync RAT
Two malicious Python packages, sisaws and secmeasure, were discovered in the Python Package Index (PyPI) repository. These packages, created by…
-
Paper Werewolf targets Russia with WinRAR zeroday vulnerability
A series of attacks by the Paper Werewolf (GOFFEE) cluster exploited vulnerabilities in WinRAR, including CVE-2025-6218 and a zero-day flaw.…
-
Fake Empire Podcast Invites Target Crypto Industry with macOS AMOS Stealer
A new phishing campaign is targeting crypto industry developers and influencers with fake interview requests impersonating the popular Empire podcast.…
-
Malicious PyPI Packages Deliver SilentSync RAT
Two malicious Python packages, sisaws and secmeasure, were discovered in the Python Package Index (PyPI) repository. These packages, created by…
-
AppSuite, OneStart & ManualFinder: The Nexus of Deception
This analysis reveals connections between three seemingly distinct malicious programs: AppSuite, OneStart, and ManualFinder. The investigation uncovers shared server infrastructure…
-
FileFix in the wild! New FileFix campaign goes beyond POC and leverages steganography
A sophisticated FileFix attack campaign has been discovered, marking the first use of this technique beyond proof-of-concept. The attack employs…

