Blog

Blog
ConnectWise ScreenConnect Emerges as Most Frequently Exploited RAT in 2025 Cyber Attacks

Cofense Intelligence’s May 2025 report reveals the alarming trend in which cybercriminals are leveraging legitimate Remote Access Tools (RATs) such…

Blog
Identification of Numerous Malicious Packages on NPM Engaging in Host and Network Data Collection
Blog
Exploitation of TikTok for Malware Distribution: The Utilization of Vidar and StealC via ClickFix Methodology

The malware known as Latrodectus has recently adopted the ClickFix social engineering technique as a distribution method. The ClickFix approach…

Blog
Cetus Protocol Cryptocurrency Heist Results in $223 Million Theft by Cybercriminals

The decentralized exchange Cetus Protocol has reported a significant breach, with hackers absconding with $223 million in cryptocurrency. In response…

Blog
FBI Issues Alert on Luna Moth Ransomware Attacks Targeting Legal Firms

The FBI has issued a warning regarding an extortion group known as the Silent Ransom Group, which has been actively…

Blog
ViciousTrap Exploits Cisco Vulnerability to Establish Global Honeypot Network Comprised of 5,300 Compromised Devices

Cybersecurity researchers have revealed that a threat actor, identified as ViciousTrap, has successfully compromised approximately 5,300 unique network edge devices…