Content Paint

malware

Insurer pulls back from "unprofitable" US cyber market

Rates for cyber insurance keep falling even in a "very active claims environment"

Tech firms exploited, urged to threat-hunt for deeply persistent “BRICKSTORM” malware

Stealthy attacker gaining dwell time of over a year on average.

What is CISA’s newly open-sourced Thorium?

"Users can define a series of modular steps—such as static file analysis, dynamic sandboxing, hash verification, unpacking, or signature detection"

"Absurd" 12-step malware dropper spotted in malicious npm packages

Supply chain attack effort used steganography, a "dizzying wall of Unicode characters" and more.

Authorities claim to have broken key links in the ‘ransomware kill chain’…for now at least

Cybercrim whack-a-mole as Operation Endgame continues

A rat pokes its head through a cardboard box. the SpyNote malware is described as an AndroidOS RAT

China nexus group suspected as the attackers behind attacks

CISA uncovers more Ivanti ICS  targeting malware…dub it RESURGE

It’s the end of March 2025...of course CISOs still need to worry about Ivanti Connect Secure flaws.

A malicious file pop up on a Windows laptop. ClearFake uses fake pop ups to prompt users to run infected code

Threat is "widespread and affects many users worldwide."

new macOS malware XCSSET

Fresh persistence and obfuscation techniques seen in dangerous XCSSET family

Search the site

Your link has expired. Please request a new one.
Your link has expired. Please request a new one.
Your link has expired. Please request a new one.
Great! You've successfully signed up.
Great! You've successfully signed up.
Welcome back! You've successfully signed in.
Success! You now have access to additional content.