Kimsuky Spreads DocSwap Android Malware via QR Phishing Posing as Delivery App
Dec 18, 2025Ravie LakshmananMalware / Mobile Security The North Korean threat actor known as Kimsuky has been linked to a...
Dec 18, 2025Ravie LakshmananMalware / Mobile Security The North Korean threat actor known as Kimsuky has been linked to a...
Dec 17, 2025Ravie LakshmananEmail Security / Threat Intelligence The Russian state-sponsored threat actor known as APT28 has been attributed to...
Dec 17, 2025Ravie LakshmananVulnerability / Malware The threat actor linked to Operation ForumTroll has been attributed to a fresh set...
The threat actor known as Jewelbug has been increasingly focusing on government targets in Europe since July 2025, even as...
Dec 09, 2025Ravie LakshmananRansomware / Endpoint Security The threat actor known as Storm-0249 is likely shifting from its role as...
The threat actor known as Silver Fox has been spotted orchestrating a false flag operation to mimic a Russian threat...
A threat actor known as ShadyPanda has been linked to a seven-year-long browser extension campaign that has amassed over 4.3...
Dec 01, 2025Ravie LakshmananMalware / Threat Intelligence The threat actor known as Tomiris has been attributed to attacks targeting foreign...
Nov 27, 2025Ravie LakshmananMalware / Social Engineering The threat actor known as Bloody Wolf has been attributed to a cyber...
Nov 25, 2025Ravie LakshmananMalware / Vulnerability The threat actor known as ToddyCat has been observed adopting new methods to obtain...
A China-nexus threat actor known as APT24 has been observed using a previously undocumented malware dubbed BADAUDIO to establish persistent...
Cyber-enabled kinetic targeting: Iran-linked actor uses cyber operations to support physical attacks Pierluigi Paganini November 20, 2025 Iran-linked actors mapped...
Nov 19, 2025Ravie LakshmananCyber Espionage / MalwareThe threat actor known as PlushDaemon has been observed using a previously undocumented Go-based...
Cybersecurity researchers have discovered a set of seven npm packages published by a single threat actor that leverages a cloaking...
The threat actor known as Dragon Breath has been observed making use of a multi-stage loader codenamed RONINGLOADER to deliver...