Aeternum C2, developed in C++, operates by writing commands into smart contracts on the Polygon blockchain.
malware
Steaelite allows cybercriminals to control victims’ machines through a single browser panel.
The attackers create fake Next.js projects, a popular JavaScript framework, and host them on platforms like Bitbucket.
SURXRAT is sold through a Telegram channel, with two licensing tiers: a Reseller Plan for a one-time...
UnsolicitedBooker, a China-aligned threat actor active since at least March 2023, has deployed two distinct backdoors, LuciDoor...
Financially motivated threat operation GrayCharlie, which overlaps with SmartApeSG, has leveraged compromised WordPress sites belonging to U.S....
Organizations in Western and Central Europe have been targeted by Russian state-backed threat operation APT28 with webhook-based...
Threat actor focuses on identity-based attacks followed by a ransomware drop.
The attack begins with seemingly ordinary emails disguised as payment requests, business queries, or signed bank documents.