How Banking Trojan Grandoreiro is Evolving Tactics To Attack Victims in LATAM
A new wave of phishing emails is sweeping across Latin America, and once again, Grandoreiro is behind it. This banking trojan is no newcomer; it's been active for years, evolving steadily into a more...
NCSC Warns of MOONSHINE & BADBAZAAR Malware Attacking Mobile Devices Worldwide
The UK's National Cyber Security Centre (NCSC) and international partners have issued urgent advisories warning about sophisticated spyware targeting specific communities globally.
The malware variants, identified as MOONSHINE and BADBAZAAR, are being deployed in surveillance...
Windows CLFS Zero-Day Vulnerability Actively Exploited by Ransomware Group
A critical zero-day vulnerability in the Windows Common Log File System (CLFS) has been uncovered and is being actively exploited by a ransomware group.
The vulnerability Tracked as CVE-2025-29824, this elevation of privilege flaw has...
Hackers Exploiting Windows .RDP Files For Rogue Remote Desktop Connections
In a sophisticated espionage campaign targeting European government and military institutions, hackers believed to be connected with Russian state actors have been utilizing a lesser-known feature of Windows Remote Desktop Protocol (RDP) to infiltrate...
New Sakura RAT Emerges on GitHub, Successfully Evading AV & EDR Protections
A new Remote Access Trojan (RAT) called Sakura has been published on GitHub. Due to its sophisticated anti-detection capabilities and comprehensive system control features, Sakura is raising significant concerns in the cybersecurity community.
The malware,...
Top 10 Best Password Managers in 2025
Password managers help to securely store and manage passwords, enhancing security and simplifying access across various platforms.
Top password management solutions make password protection easy and effective for online security. These solutions securely store your...
Hackers Leveraging Fast Flux Technique to Evade Detection & Hide Malicious Servers
CISA warns of threat actors' increasing adoption of the fast flux technique to evade detection and conceal malicious server infrastructures.
As cybercriminal operations grow increasingly sophisticated, threat actors adopt advanced techniques like fast flux to mask malicious...
Threat Actors Allegedly Selling SnowDog RAT Malware With Control Panel on Hacker Forums
A new Remote Access Trojan (RAT) dubbed "SnowDog RAT” is malicious software purportedly marketed for $300 per month. It appears to have been specifically developed for corporate espionage and targeted attacks on business environments.
The...
GoResolver – A New Tool to Analyze Golang Malware & Extract Obfuscated Functions
GoResolver, a ground-breaking open-source tool, was unveiled to address one of the most persistent issues in malware analysis: deobfuscating Golang binaries.
Developed by Volexity, this innovative solution employs control-flow graph similarity techniques to recover obfuscated...
How Fileless Malware Works? – Analysis of Real Samples
You might think that catching malware is all about spotting shady files on your system. But what if there’s no file to find and the entire attack happens in the background, without leaving a...