Threats

AI-Powered Email Attacks – Iranian Threat Groups Targeting Cybersecurity Experts and Academics

Iranian state-sponsored cyber groups have significantly enhanced their offensive capabilities in the aftermath of June 2025 military strikes, deploying sophisticated…

9 months ago

Exploiting SVG Files – How Threat Actors Are Using Them to Deliver Malicious JavaScript

Cybersecurity researchers have uncovered a sophisticated new attack campaign where threat actors are weaponizing Scalable Vector Graphics (SVG) files to…

9 months ago

28+ New Packages Used by Threat Actors to Spread Protestware

Socket's Threat Research Team has uncovered a significant supply chain security incident involving protestware that has spread across at least…

9 months ago

U.S. Critical Infrastructure Under Siege – Iranian Threat Actors Target Water Systems and More

In recent weeks, U.S. water treatment facilities and other critical infrastructure have come under sustained digital assault attributed to Iranian-linked…

9 months ago

US Targets Key Threat Actors Connected to North Korea’s Remote IT Worker Operation

The U.S. Treasury Department's Office of Foreign Assets Control (OFAC) today sanctioned Song Kum Hyok, a North Korean cyber actor…

10 months ago

NSB Issues Warning on Cybersecurity Threats Posed by Popular Chinese Apps – Rednote, Weibo, TikTok, WeChat, and Baidu Cloud

The National Security Bureau (NSB) of Taiwan has issued a critical warning about the cybersecurity risks associated with five widely…

10 months ago

XWorm: Evolving Threat – New Stagers and Loaders Outwit Security Systems

In the ever-shifting landscape of cybercrime, XWorm, a notorious remote access trojan (RAT), continues to evolve, arming threat actors with…

10 months ago

Unseen Wings – How Blind Eagle Hackers Deploy Open-Source RATs and Ciphers to Evade Static Detection

In a recent detailed investigation by Trustwave SpiderLabs, the threat group Blind Eagle (APT-C-36) has been linked with the Russian bulletproof hosting…

10 months ago

Clickfix Tactics – How Threat Actors Use Malicious AppleScripts to Harvest Login Credentials

Recent cybersecurity research has exposed a sophisticated malware campaign targeting macOS users through a technique dubbed “Clickfix.” This attack leverages…

10 months ago

NetNerve: AI-Driven PCAP Analysis for Anomaly Detection and Threat Identification

A revolutionary artificial intelligence-powered platform has emerged to transform how cybersecurity professionals analyze network packet captures, offering automated threat detection…

10 months ago