-
A newly identified malware loader dubbed “Kiss Loader” is emerging as a potential threat, leveraging advanced process injection techniques and dynamic delivery infrastructure. The loader, still under active development at the time of discovery, demonst…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Fake npm install messages are the latest social engineering trick in the open source supply chain, with attackers abusing npm post‑install scripts to silently deploy a crypto‑stealing remote access trojan (RAT) in what ReversingLabs is calling the “Gho…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
A large-scale phishing campaign is actively targeting developers on GitHub by abusing the platform’s Discussions feature to distribute fake Visual Studio Code (VS Code) security alerts. The campaign appears highly coordinated, with thousands of near-id…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Mirai malware evolves into hundreds of variants, driving botnet growth, including Aisuru and KimWolf, powering large-scale attacks, and increasing risks to vulnerable IoT devices worldwide.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
A sophisticated, multi-stage delivery framework leveraging obfuscated Visual Basic Script (VBS) files, fileless PowerShell loaders, and payloads hidden within PNG images. The activity was initially detected by LevelBlue’s Managed Detection and Response…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Hackers compromised Trivy, Checkmarx, and LiteLLM in a supply chain attack, stealing cloud credentials, tokens, and crypto wallet data from developers.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
The FBI has issued a warning about Iran-linked Handala Hack Group, targeting Windows users through fake versions of WhatsApp and Telegram.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
DarkSword exploit leak puts up to 270 million iPhones at risk, with hackers able to access data through…
·
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Threat actors are continuing to aggressively target Microsoft SQL (MS-SQL) servers in 2026, with new evidence showing the deployment of a scanner malware known as ICE Cloud Client. Larva-26002 has maintained a consistent focus on poorly secured MS-SQL …
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
A newly observed malware campaign is leveraging trusted platforms like Google Forms to distribute the PureHVNC Remote Access Trojan (RAT), marking a shift in how attackers initiate infections. Rather than relying on traditional phishing emails or malic…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶


