Home Search
threat actors - search results
If you're not happy with the results, please do another search
Threat Actors Leverage Access to Valid Accounts via Phishing Attack
In a significant shift observed during the first quarter of 2025, cybersecurity experts have documented a dramatic surge in phishing attacks, with threat actors...
Threat Actors Increasingly Utilize Ransomware as a Service Boosted by EDR Killers
The cybersecurity landscape is witnessing a significant shift as threat actors increasingly leverage Ransomware as a Service (RaaS) platforms enhanced by sophisticated Endpoint Detection...
Threat Actors Weaponize Language Software to Windows-Based Remote Surveillance Malware
Senior members of the World Uyghur Congress (WUC) living in exile became targets of a sophisticated spearphishing campaign delivering Windows-based surveillance malware.
The attack utilized...
Threat Actors Registered 26k+ Domains Mimic Brands to Trick Users
In a significant escalation of digital deception tactics, threat actors have registered over 26,000 domains in March 2025 alone, designed to impersonate legitimate brands...
Threat Actors Attacking Organization in Thailand to Deploy Ransomware
Thailand has emerged as a significant target for sophisticated ransomware attacks, with a dramatic 240% increase in cyber campaigns recorded in 2024 compared to...
Threat Actors Taking Advantage of Unsecured Kubernetes Clusters for Cryptocurrency Mining
In a troubling development for cybersecurity professionals, threat actors are increasingly targeting unsecured Kubernetes clusters to deploy cryptocurrency mining operations, leveraging the computational resources...
Threat Actors Turn More Sophisticated & Exploiting Zero-Day Vulnerabilities – Google Warns
Cybersecurity defenders face increasingly sophisticated adversaries as threat actors continue evolving their methods to circumvent modern defense systems.
According to the newly released M-Trends 2025...
Threat Actors Using Weaponized SVG Files to Redirect Users to Malicious Websites
Phishing campaigns have evolved significantly in 2025, with threat actors increasingly leveraging unconventional file formats to bypass security solutions.
A particularly concerning trend involves the...
Threat Actors Allegedly Selling Baldwin Killer That Bypasses AV & EDR
A sophisticated malware tool dubbed "Baldwin Killer" is reportedly being marketed on underground forums as a powerful solution for bypassing antivirus (AV) and endpoint...
Threat Actors Using Cascading Shadows Attack Chain to Avoid Detection & Complicate Analysis
A sophisticated phishing campaign leveraging a multi-layered attack chain dubbed "Cascading Shadows" has been uncovered by the Palo Alto Networks' Unit 42 researchers in...