More

    Exploits

    University of Hawaii Cancer Center hit by ransomware attack

    ​University of Hawaii says a ransomware gang breached its Cancer Center in August 2025, stealing data of study participants, including documents from the 1990s...

    Fake Employee Reports Spread Guloader and Remcos RAT Malware

    We all know the feeling of waiting for a performance review. It can be a stressful time, and unfortunately, cybercriminals are now using that...

    MuddyWater targets Middle East with new Rust-based malware

    The campaign leverages icon spoofing and malicious Microsoft Word documents to deploy the RustyWater implant. 

    ValleyRAT_S2 Campaign Uses Covert Malware to Extract Financial Information

    The ValleyRAT_S2 campaign uses covert malware to extract financial information from infected systems, researchers warn. 

    MuddyWater shifts to Rust-based malware in targeted ME cyber-espionage campaign

    New CloudSEK research reveals how the APT group has evolved its tooling with a stealthy Rust implant to strengthen persistence, evasion, and intelligence collection...

    Weaponized Employee Performance Reports Used to Deliver Guloader Malware

    Attackers are using weaponized employee performance reports to deliver Guloader malware through phishing campaigns. 

    CrazyHunter ransomware escalates with advanced intrusion tactics, six Taiwan healthcare victims confirmed

    New research from Trellix detailed that CrazyHunter ransomware has emerged as a serious and escalating threat, underscoring the growing sophistication of modern cybercriminal operations....

    Microsoft is making Teams more secure starting today: here’s what’s changing

    Starting today, Microsoft is making it more difficult for cyber attackers to infiltrate organizations via Teams. A new update now blocks dangerous file types...

    ValleyRAT_S2 Attacking Organizations to Deploy Stealthy Malware and Extract Financial Details

    ValleyRAT_S2 malware uses fake software and DLL side-loading to quietly breach networks and steal sensitive financial data. 

    Latest articles