Saturday, April 25, 2026
HomeThreats

Threats

New REMCOS Variant Leverages LNK Files to Evade Antivirus Detection and Empower Threat Actors

Cybersecurity researchers have identified a sophisticated malware campaign utilizing malicious Windows shortcut (LNK) files to deliver the REMCOS backdoor, demonstrating how threat actors continue to evolve their tactics to bypass security measures. The attack, identified through analysis of the file "ORDINE-DI-ACQUIST-7263535" (SHA256: 506ecb76cf8e39743ec06129d81873f0e4c1ebfe7a352fc5874d0fc60cc1d7c6), showcases...

Raven Stealer Malware – How a Telegram-based Threat Pilfers Login Details, Payment Info, and Autofill Data

In a rapidly evolving cybercrime landscape, a new information-stealing malware dubbed Raven Stealer has emerged, directly targeting Windows users and leveraging Telegram for real-time data exfiltration. First identified in July 2025 and actively distributed via GitHub and dedicated Telegram channels, this sophisticated Delphi/C++ malware lowers the barrier for even novice...

Developer Accounts Under Attack – How Threat Actors Are Exploiting Prettier Tooling Packages

The Node.js ecosystem faced a critical supply chain attack this week as several popular npm packages, including eslint-config-prettier and eslint-plugin-prettier were compromised through a coordinated phishing campaign. The breach highlights growing concerns about the security of open-source maintainers. It highlights the ease with which credentials can be...

SVF Botnet Infects Linux SSH Servers in Ongoing Threat Actor Attacks

Cybersecurity researchers at AhnLab Security Intelligence Center (ASEC) have identified a sophisticated campaign targeting poorly secured Linux servers through SSH brute force attacks, deploying a Python-based DDoS botnet called SVF Bot that leverages Discord as its command-and-control infrastructure. Discord-Powered Botnet Architecture The SVF Botnet represents a...

AI-Powered Email Attacks – Iranian Threat Groups Targeting Cybersecurity Experts and Academics

Iranian state-sponsored cyber groups have significantly enhanced their offensive capabilities in the aftermath of June 2025 military strikes, deploying sophisticated AI-crafted phishing campaigns that specifically target cybersecurity researchers and academic institutions. The escalation represents a concerning evolution in Tehran's cyber warfare tactics, with Advanced...

Exploiting SVG Files – How Threat Actors Are Using Them to Deliver Malicious JavaScript

Cybersecurity researchers have uncovered a sophisticated new attack campaign where threat actors are weaponizing Scalable Vector Graphics (SVG) files to deliver malicious JavaScript payloads and redirect unsuspecting users to attacker-controlled infrastructure. This emerging technique exploits the trusted nature of image files to bypass traditional...