More

    Exploits

    Novel BQTLOCK RaaS operation examined

    Newly emergent BQTLock ransomware-as-a-service which has been associated with alleged pro-Palestinian hacktivist group Liwaa Mohammed's leader ZerodayX has already gained a new variant with...

    Proxyware Malware Mimic as YouTube Video Download Site Delivers Malicious Javascripts

    Cybersecurity researchers have observed a surge in deceptive sites masquerading as YouTube video download services to deliver Proxyware malware in recent weeks. Victims seeking...

    Ongoing APT36 malware attacks involve Linux .desktop files

    BleepingComputer reports that Indian government and defense organizations have been targeted by Pakistan-linked threat operation APT36, also known as Transparent Tribe, in attacks involving...

    New macOS Installer Boasts Lightning-Fast Data Theft, Marketed on Dark Web

    A novel macOS infostealer malware, designated as Mac.c, has emerged as a formidable contender in the underground malware-as-a-service (MaaS) ecosystem. Developed openly by a...

    Pakistan-linked APT36 abuses Linux .desktop files to drop custom malware in new campaign

    Pierluigi Paganini August 25, 2025 Transparent Tribe (aka APT36, Operation C-Major, and Mythic Leopard), a Pakistan-linked threat actor, is using Linux .desktop files to...

    Ransomware Surges As AI Drives New Cyber Threats

    The number of publicly known ransomware victims jumped early 70% compared to the same period in 2023 and 2024, according to the newly released...

    Android.Backdoor.916.origin malware targets Russian business executives

    Pierluigi Paganini August 25, 2025 Doctor Web researchers observed a multifunctional backdoor Android.Backdoor.916.origin targeting Android devices belonging to representatives of Russian businesses. The malware...

    New macOS Installer Promising Lightning-fast Data Exfiltration Advertised on Dark Web

    New macOS stealer 'Mac.c' sold on darknet for $1,500/month, targeting credentials, crypto wallets, and metadata with stealthy tactics. 

    KorPlug Malware Unmasked – TTPs, Control Flow, IOCs Exposed

    KorPlug malware uses O-LLVM obfuscation & DLL side-loading to evade detection, complicate analysis, and execute via EnumSystemGeoID. 

    Latest articles