Katz Stealer: infostealers targets 78+ Chromium and Gecko-based browsers
A newly uncovered information stealer, dubbed Katz Stealer, has rapidly emerged as a formidable threat to both enterprise and individual…
Trojanized KeePass campaign: novel loader and credential theft in ransomware operations
A recent investigation by WithSecure’s Threat Intelligence team has uncovered a sophisticated malware campaign leveraging a trojanized version of the…
China-Linked APTs exploit critical SAP NetWeaver vulnerability to breach over 580 systems globally
In a significant escalation of cyber-espionage activities, multiple China-affiliated advanced persistent threat (APT) groups have been found actively exploiting a…
JPEG image FUD ransomware: a way to evades antivirus solutions
In a concerning development for cybersecurity professionals, threat actors have begun leveraging a novel Fully UnDetectable (FUD) ransomware attack technique…
New malware LOSTKEYS uncovered in COLDRIVER campaign targeting Western governments and NGOs
The Google Threat Intelligence Group (GTIG) has recently uncovered a sophisticated new malware strain, dubbed LOSTKEYS, deployed by the Russian…
German authorities shut down major crypto-swapping platform “eXch,” seizing €34 million in illicit assets
On April 30, 2025, the Frankfurt am Main General Prosecutor’s Office-Central Unit for Combating Internet Crime (ZIT)-in close collaboration with…
Tactical reality behind the India-Pakistan hacktivist surge
In May 2025, a wave of hacktivist activity targeting Indian digital infrastructure sparked widespread alarm in media and social networks,…
From PDF invoice to geo-fenced RAT delivery campaign
A recent campaign targeting Southern European organizations demonstrates advanced evasion techniques combining social engineering, trusted platforms, and geolocation filtering. The…