Back to Blog

#Malware

10 posts
TCLBANKER turns WhatsApp and Outlook into trusted malware delivery channels

TCLBANKER turns WhatsApp and Outlook into trusted malware delivery channels

TCLBANKER turns WhatsApp and Outlook into trusted malware delivery channels The most important detail in Elastic's new TCLBANKER research is not just that a Bra...

May 9, 2026
5 min read
DAEMON Tools supply-chain attack turns trusted installers into a malware delivery path

DAEMON Tools supply-chain attack turns trusted installers into a malware delivery path

DAEMON Tools supply-chain attack turns trusted installers into a malware delivery path The most important part of the DAEMON Tools incident is not that malware...

May 6, 2026
5 min read
GlassWorm sleeper extensions turn Open VSX updates into a malware delivery path

GlassWorm sleeper extensions turn Open VSX updates into a malware delivery path

GlassWorm sleeper extensions turn Open VSX updates into a malware delivery path The newest GlassWorm wave matters because it turns the normal extension update p...

April 28, 2026
5 min read
Firestarter leaves patched Cisco firewalls at continued risk

Firestarter leaves patched Cisco firewalls at continued risk

Firestarter leaves patched Cisco firewalls at continued risk A newly detailed persistence mechanism called Firestarter changes the defender story around last ye...

April 26, 2026
5 min read
AgingFly campaign hits Ukrainian government and hospital networks

AgingFly campaign hits Ukrainian government and hospital networks

AgingFly campaign hits Ukrainian government and hospital networks A newly reported campaign centered on the AgingFly backdoor is a reminder that targeted intrus...

April 16, 2026
5 min read
CPUID breach turned CPU-Z and HWMonitor into a malware delivery path

CPUID breach turned CPU-Z and HWMonitor into a malware delivery path

CPUID breach turned CPU-Z and HWMonitor into a malware delivery path Executive summary A compromise of the CPUID website briefly turned trusted download links f...

April 13, 2026
5 min read
Axios npm compromise pushed a cross-platform RAT through a fake dependency

Axios npm compromise pushed a cross-platform RAT through a fake dependency

Axios npm compromise pushed a cross-platform RAT through a fake dependency A compromise of the widely used axios package on npm shows why defenders cannot rely...

April 1, 2026
5 min read
Trivy GitHub Action compromise exposed CI/CD secrets in a stealth supply-chain attack

Trivy GitHub Action compromise exposed CI/CD secrets in a stealth supply-chain attack

Trivy GitHub Action compromise exposed CI/CD secrets in a stealth supply-chain attack A supply-chain compromise in Aqua Security’s aquasecurity/trivy-action sho...

March 22, 2026
4 min read
GlassWorm Shifts to Transitive Open VSX Dependencies in Developer Supply-Chain Push

GlassWorm Shifts to Transitive Open VSX Dependencies in Developer Supply-Chain Push

GlassWorm Shifts to Transitive Open VSX Dependencies in Developer Supply-Chain Push GlassWorm is no longer just a story about obviously malicious extensions. Th...

March 21, 2026
5 min read
Slopoly Shows How AI-Generated Malware Is Entering Ransomware Operations

Slopoly Shows How AI-Generated Malware Is Entering Ransomware Operations

Slopoly Shows How AI-Generated Malware Is Entering Ransomware Operations | 2026 Executive Summary IBM X-Force says a ransomware-linked intrusion involved a like...

March 17, 2026
4 min read