Threat hunters have shed light on a sophisticated and evolving malware toolkit called Ragnar Loader that's used by various cybercrime and ransomware groups like Ragnar Locker (aka Monstrous Mantis), FIN7, FIN8, and Ruthless Mantis (ex-REvil).
Microsoft has unveiled a large-scale malvertising campaign impacting over one million devices worldwide, aimed at stealing sensitive information. Detected in early December 2024, this campaign, dubbed Storm-0408, highlights the evolving threats in online advertising.
Discover how 224 malicious apps, downloaded over 38 million times, were removed from the Google Play Store after researchers uncovered the 'SlopAds' ad fraud campaign. Learn how to protect your device and recognize fraudulent apps.
Discover how the ClickFix malware has evolved into sophisticated MetaStealer attacks using fake CAPTCHAs, File Explorer tricks, and MSI lures. Learn how to stay protected with expert threat intelligence.
Google has taken down 224 malicious Android apps involved in the 'SlopAds' ad fraud campaign, generating 2.3 billion fraudulent ad requests daily. Learn how this operation worked and its impact on cybersecurity.
A sophisticated supply chain attack targeting the npm registry has compromised over 40 packages, including the popular `@ctrl/tinycolor` library. Discover how the attack unfolded, its implications for developers, and steps to mitigate risks.
Discover how the China-linked APT group Mustang Panda is leveraging the advanced SnakeDisk USB worm and updated TONESHELL backdoor to target Thai government networks. Learn about the worm's propagation techniques, its connection to geopolitical tensions, and the broader implications for cybersecurity.
Discover how the FileFix malware campaign exploits fake Facebook security alerts to trick users into downloading the StealC infostealer. Learn about its rapid evolution, tactics, and how to protect yourself.
Discover how a new FileFix variant is using multilingual phishing sites to distribute StealC malware. Learn about the tactics, risks, and how to protect yourself from this evolving cybersecurity threat.
Discover how cybercriminals use the FileFix attack to deceive users with fake Meta account suspension warnings, leveraging steganography to secretly install StealC malware. Learn about the attack's mechanisms, risks, and how to protect yourself.
Discover how the SlopAds fraud ring exploited 224 Android apps, generating 2.3 billion daily ad bids through hidden WebViews and steganography. Learn about the mechanics of this cybersecurity threat and its global impact.
Discover how cybercriminals are leveraging SEO poisoning and fake software sites to distribute malware like HiddenGh0st, Winos, and kkRAT to Chinese-speaking users. Learn about the tactics, risks, and how to stay protected.
Discover how the China-aligned threat actor Mustang Panda is deploying the SnakeDisk USB worm to deliver the Yokai backdoor, specifically targeting devices with Thailand-based IP addresses. Learn about the implications and technical details of this cybersecurity threat.
Discover the latest malware threats, cybersecurity research, and emerging attack vectors in this comprehensive roundup. Learn about compromised npm packages, advanced malware techniques, and critical vulnerabilities targeting healthcare, Docker APIs, and macOS systems.
Apple has issued multiple spyware attack warnings in 2025, with France's CERT-FR confirming targeted threats. Learn about the risks, affected users, and steps to protect your devices.
Discover how the new HybridPetya ransomware leverages the CVE-2024-7344 vulnerability to bypass UEFI Secure Boot, posing a severe threat to system security. Learn about its origins, impact, and mitigation strategies.
Discover how the HybridPetya ransomware bypasses UEFI Secure Boot to infect systems, its implications for cybersecurity, and how to protect your devices.
Apple has alerted users about targeted spyware attacks on their devices. Discover the details, potential risks, and steps to protect yourself from these sophisticated cyber threats.
Discover how cybercriminals are leveraging ConnectWise ScreenConnect to deploy AsyncRAT malware, stealing sensitive credentials and cryptocurrency. Learn about the attack mechanism, implications, and how to protect your systems.
Cybercriminals are exploiting ConnectWise ScreenConnect to deploy AsyncRAT using fileless malware techniques. Learn how attackers bypass traditional defenses, achieve persistence, and exfiltrate sensitive data.
Discover how the 'EggStreme' malware framework, linked to Chinese APT groups, was used to infiltrate a military company in the Philippines. Learn about its in-memory capabilities, implications for cybersecurity, and the broader geopolitical context.
Discover how a sophisticated Chinese APT group deployed the undocumented EggStreme fileless malware to infiltrate Philippine military systems. Learn about the tactics, implications, and how fileless malware evades detection.
Discover the latest cybersecurity threats: CHILLYHELL, a macOS backdoor, and ZynorRAT, a Go-based RAT targeting Windows and Linux. Learn about their capabilities, risks, and how to protect your systems.
Discover how the ChillyHell macOS malware evaded Apple's security for four years, its potential origins, and the implications for cybersecurity. Learn how this modular backdoor operated undetected and what it means for macOS users.
Discover how cybercriminals are leveraging advanced phishing techniques and AI-driven malware like MostereRAT and ClickFix to bypass security measures. Learn about the evolving threats, evasion tactics, and how to protect your systems.
Discover how the GPUGate malware campaign uses deceptive Google Ads and fake GitHub commits to target IT firms. Learn about the tactics, risks, and how to protect your organization.
Explore the latest malware threats, APT campaigns, and cybersecurity risks in September 2025. Discover how North Korean APT37, Lazarus Group, and other threat actors are targeting global entities, along with insights into AI-driven attacks, cryptojacking, and ransomware detection methods.
Discover how VirusTotal uncovered a sophisticated phishing campaign using SVG files to impersonate Colombia’s judicial system and deliver malware. Learn about the risks, tactics, and how to protect yourself from this emerging cyber threat.
Discover how an AI-driven malware attack, dubbed 's1ngularity,' compromised 2,180 GitHub accounts, leaking sensitive tokens and repository secrets. Learn about the implications for cybersecurity and supply chain security.
Discover the groundbreaking story behind the first AI-powered ransomware, its origins as a research experiment, and its implications for cybersecurity. Learn how this innovation reshapes the threat landscape.