Attack

Malicious Extension Crashes Browsers to Install New RAT
Malware & Threats Malicious Extension Crashes Browsers to Install New RAT

The mundane frustration of a crashing web browser might be more than just a technical glitch; for thousands of users, it has become the gateway to a sophisticated cyberattack designed to seize control of their systems. A malicious Google Chrome extension, downloaded over 5,000 times from the

Is VoidLink a New Class of Linux Cloud Malware?
Security Operations & Management Is VoidLink a New Class of Linux Cloud Malware?

Today we’re speaking with Rupert Marais, our in-house security specialist, to unpack a deeply concerning development in the world of cybersecurity. A newly discovered malware framework, dubbed VoidLink, is poised to change how we think about threats to Linux systems. Far from a simple script, this

What Makes the New Fog Ransomware So Dangerous?
Malware & Threats What Makes the New Fog Ransomware So Dangerous?

A highly focused and financially motivated ransomware campaign has been systematically targeting organizations across the United States, demonstrating a rapid and destructive operational model that prioritizes speed over subtlety. First identified in early May 2024, the threat, known as Fog

Fake WinRAR Sites Deliver Sophisticated Winzipper Trojan
Malware & Threats Fake WinRAR Sites Deliver Sophisticated Winzipper Trojan

The immense popularity of everyday software utilities creates a landscape of trust that cybercriminals are increasingly adept at exploiting through highly convincing fraudulent websites and sophisticated malware. A newly uncovered campaign is leveraging the trusted name of the WinRAR file archiver

Who Is China's Newest Cyberespionage Broker?
Malware & Threats Who Is China's Newest Cyberespionage Broker?

The global stage of cyber warfare is increasingly defined by specialization, where state-sponsored threat actors are no longer monolithic entities but part of a complex, collaborative ecosystem. A newly identified China-nexus threat actor, tracked as UAT-7290, exemplifies this evolution by

Is Your Coolify Server Vulnerable to Complete Takeover?
Malware & Threats Is Your Coolify Server Vulnerable to Complete Takeover?

A recent and comprehensive security disclosure has cast a harsh spotlight on the inherent risks of self-hosted infrastructure, revealing that the popular open-source platform Coolify contains a staggering 11 critical vulnerabilities that could allow attackers to achieve a full compromise of the

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later