
Category: Threat Intel Reports
-
New ClickFix Attack Exploits Fake Cloudflare Human Check to Install Malware Silently
A sophisticated new social engineering attack campaign has emerged that exploits users’ familiarity with routine security checks to deliver malware…
-
Blitz Malware: A Tale of Game Cheats and Code Repositories
Blitz is a new Windows-based malware discovered in 2024 consisting of a downloader and bot payload. The latest version was…
-
Operation DRAGONCLONE: Chinese Telecom Targeted by Malware
A sophisticated cyber campaign targeting China Mobile Tietong Co., Ltd., a subsidiary of China Mobile, has been uncovered. The operation,…
-
How Threat Actors Exploit Human Trust: A Breakdown of the Prove You Are Human Malware Scheme
A malicious campaign exploits user trust through deceptive websites, including spoofed Gitcodes and fake Docusign verification pages. Victims are tricked…
-
How Threat Actors Exploit Human Trust: A Breakdown of the Prove You Are Human Malware Scheme
A malicious campaign exploits user trust through deceptive websites, including spoofed Gitcodes and fake Docusign verification pages. Victims are tricked…
-
StopRansomware: Play Ransomware
The Play ransomware group has been actively targeting businesses and critical infrastructure across North America, South America, and Europe since…
-
Cybercriminals camouflaging threats as AI tool installers
Cybercriminals are exploiting the popularity of AI by distributing malware disguised as AI solution installers. Three threats have been identified:…
-
The strange tale of ischhfd83: When cybercriminals eat their own
This investigation uncovered a large-scale campaign involving backdoored GitHub repositories targeting game cheaters and inexperienced cybercriminals. The threat actor, possibly…
-
Venom Spider Uses ServerSide Polymorphism to Weave a Web Around Victims
Arctic Wolf Labs discovered a new campaign by Venom Spider targeting corporate HR departments with fake resumes containing the More_eggs…
-
CISOs Playbook for Managing Boardroom Cybersecurity Concerns
As cybersecurity threats intensify and regulatory scrutiny increases, Chief Information Security Officers (CISOs) face mounting pressure to communicate complex technical…

