Malware & Ransomware

10
Feb
Amaranth‑Dragon weaponizes CVE‑2025‑8088 against SE Asia critical infrastructure

Amaranth‑Dragon weaponizes CVE‑2025‑8088 against SE Asia critical infrastructure

Checkpoint’s threat‑intelligence team has linked the state‑aligned group Amaranth‑Dragon to active exploitation of the newly disclosed
1 min read
10
Feb
Shadow Campaigns Expose Global Espionage Exploiting SAP and Exchange Flaws

Shadow Campaigns Expose Global Espionage Exploiting SAP and Exchange Flaws

Unit42’s “Shadow Campaigns” report uncovers a coordinated espionage effort that has compromised organizations worldwide by chaining together a variety
1 min read
05
Feb
PDFs Weaponized to Drop Remote Access Trojan via Malicious JavaScript

PDFs Weaponized to Drop Remote Access Trojan via Malicious JavaScript

Security researchers observed a new phishing campaign that distributes seemingly benign PDF documents. When opened, the PDFs execute embedded JavaScript
1 min read
05
Feb
vDefend Extends Zero‑Trust Automation to VMware Private Clouds

vDefend Extends Zero‑Trust Automation to VMware Private Clouds

VMware’s security team unveiled vDefend, a solution that embeds zero‑trust principles directly into private cloud workloads. By automating
1 min read
05
Feb
AI‑Powered Phishing Surge and New Ransomware Playbook Threaten Enterprises

AI‑Powered Phishing Surge and New Ransomware Playbook Threaten Enterprises

Check Point’s February 2 threat‑intel brief highlights a sharp rise in AI‑generated phishing emails that mimic corporate
1 min read
05
Feb
Record 31.4 Tbps DDoS Hits Major Service – Lessons for Defenders

Record 31.4 Tbps DDoS Hits Major Service – Lessons for Defenders

In Q4 2025 Cloudflare logged a 31.4 Tbps distributed denial‑of‑service assault, the largest ever measured. The multi‑
1 min read
05
Feb
AI‑Powered OpenClaw Generates Self‑Evolving Malware Variants

AI‑Powered OpenClaw Generates Self‑Evolving Malware Variants

CrowdStrike’s latest research reveals OpenClaw, an AI‑driven malware framework that can automatically create new code variants, tailor its
1 min read
05
Feb
Sophos CISO Warns: Fake Remote IT Hires Threaten Enterprise Access

Sophos CISO Warns: Fake Remote IT Hires Threaten Enterprise Access

During a recent Reddit AMA, Sophos CISO Ross McKerchar revealed that cybercriminals are increasingly masquerading as remote IT contractors to
1 min read
04
Feb
Grok AI Still Spits Out Sexual Content, Moderation Fails Again

Grok AI Still Spits Out Sexual Content, Moderation Fails Again

Malwarebytes has confirmed that the Grok AI image‑generation model continues to produce sexualized images despite earlier assurances that the
1 min read
04
Feb
New Check Point Report Flags Ransomware Surge, Supply‑Chain Threats, Credential‑Stuffing Spike

New Check Point Report Flags Ransomware Surge, Supply‑Chain Threats, Credential‑Stuffing Spike

Check Point’s February 2, 2026 Threat Intelligence Report highlights a sharp uptick in ransomware activity, more sophisticated supply‑chain
1 min read