To prepare malicious documents, threat actors are increasingly using VBA code. As observed by researchers, threat actors recently have adopted the trend of using a VBA Purging technique, whi... Read more
The criminal outfit known for its cryptomining operations, Team TNT has enhanced its arsenal with new tools with sharpened capabilities. It has been observed that a new bot named TNTbotinger... Read more
The Gitpaste-12 worm that disseminates through GitHub and uses GitHub and Pastebin to host malicious payload has been active again with new exploits. The worm was earlier found to be exploit... Read more
Fake Windows and Android installers for the Cyberpunk 2077 game are being distributed by a threat actor that is further installing ransomware called CoderWare. In order to trick users into d... Read more
A recently discovered botnet called Gitpaste – 12 has made its return with a new attack campaign that targets web applications, IP cameras, and routers. Researchers discovered Gitpaste... Read more
The Pay2Key ransomware which was recently discovered to being used by an Iranian APT is steadily emerging as a dangerous threat in the ransomware landscape. The ransomware, which made its fi... Read more