Threat Report XWORM V6 New advanced evasion techniques and AMSI bypass capabilities revealed in XWorm version 6.0 Threat Overview In September 2024, Netskope Threat Labs reported on the XWorm malware and its infection chain. After nearly
Continue ReadingMonth: July 2025
The Covert Operators Playbook Infiltration of Global Telecom Networks
Threat Report The Covert Operator's Playbook: Infiltration of Global Telecom Networks A detailed analysis of the infiltration tactics used by a sophisticated actor group targeting global telecom networks. Threat Overview The Covert Operator's Playbook is a
Continue ReadingRaven Stealer Unmasked Telegram-Based Data Exfiltration
Threat Report RAVEN STEALER UNMASKED: TELEGRAM-BASED DATA EXFILTRATION A sophisticated information-stealing malware targeting Chromium-based browsers. Threat Overview Raven Stealer is a modern, lightweight information-stealing malware developed in Delphi and C++. It specifically targets Chromium-based browsers to
Continue ReadingToolShell An All You Can Eat Buffet For Threat Actors
Threat Report TOOLSHELL A comprehensive threat report detailing the capabilities and implications of a new cyber threat. Threat Overview ToolShell is an emerging cyber threat that provides a wide array of tools for malicious actors, making
Continue ReadingAI-Generated Malware in Panda Image Hides Persistent Linux Threat
Threat Report KOSKE A sophisticated Linux malware campaign leveraging AI-assisted development to exploit misconfigured servers and install backdoors. Threat Overview The Koske malware campaign represents a significant advancement in cyber threats, utilizing AI-generated techniques to create
Continue ReadingNew MacOS ZuRu Variant Discovered
Threat Report New MacOS.ZuRu Variant A sophisticated malware targeting macOS systems with advanced evasion techniques. Threat Overview The New MacOS.ZuRu Variant is a recently discovered threat that targets macOS systems. This variant employs advanced evasion techniques
Continue ReadingBack to Business Lumma Stealer Returns with Stealthier Methods
Threat Report LUMMA STEALER A sophisticated information stealer malware that has returned with enhanced stealth techniques. Threat Overview The Lumma Stealer is a highly advanced information-stealing malware that has recently resurfaced with more refined and stealthier
Continue ReadingActively Exploited SharePoint Vulnerabilities
Threat Report CVE-2025-53770 and CVE-2025-53771: Actively Exploited SharePoint Vulnerabilities A critical threat report published by AlienVault on 2025-07-22T09:04:10.561Z detailing two actively exploited vulnerabilities in Microsoft SharePoint Servers. Threat Overview The threat report highlights two critical vulnerabilities,
Continue ReadingPay2Key’s Resurgence Iranian Cyber Warfare Targets the West
Threat Report PAY2KEY.I2P A sophisticated ransomware-as-a-service operation targeting Western organizations Threat Overview Pay2Key, an Iranian-backed ransomware-as-a-service (RaaS) operation, has re-emerged as Pay2Key.I2P. This new variant is specifically targeting Western organizations and is linked to the Fox
Continue ReadingJune 2025 Trends Report on Phishing Emails
Threat Report Phishing Emails June 2025 A detailed report on the latest trends in phishing emails and their impact on cybersecurity. Threat Overview The June 2025 Trends Report on Phishing Emails, published by CyberHunter_NL on July
Continue Reading