
Cybercriminals camouflaging threats as AI tool installers
A report on cybercriminals disguising malware as AI tool installers, including CyberLock ransomware, Lucky_Gh0$t ransomware, and Numero malware. Learn about their tactics, targeted sectors, and mitigation strategies.

Mark Your Calendar APT41 Innovative Tactics
This report provides an in-depth analysis of the innovative tactics employed by APT41 in their recent campaign, including the use of Google Calendar for command and control. Learn about the infection chain, Google’s response, and recommended mitigation strategies.

Katz Stealer Threat Analysis Report
Katz Stealer Threat Analysis Report provides an in-depth look at the advanced credential-stealing malware targeting browsers, cryptocurrency wallets, and communication platforms. Learn about its evasion techniques, detection opportunities, and recommended mitigation strategies.

Malicious attack method on hosted ML models now targets PyPI
A threat report detailing a new malicious campaign targeting PyPI by exploiting machine learning models, and recommendations for securing the software supply chain.

Chrome 0-Day CVE-2025-4664 Exposes Windows, Linux Browser Activity
A detailed report on a critical security flaw in Google Chrome and Chromium-based browsers (CVE-2025-4664) exposing user login tokens and session IDs.

Russian GRU Targeting Western Logistics Entities and Technology Companies | CISA
A detailed report on a Russian state-sponsored cyber campaign targeting Western logistics entities and technology companies, published by CISA in collaboration with US and EU intelligence agencies.