Emulating the Unyielding Scattered Spider

AttackIQ has released a new assessment template that contains a curated list of Tools and Malware samples associated with Scattered Spider to help defenders improve their security posture against this sophisticated and ...
New Attacks Targeting the Cryptocurrency Community

Crypto Drainers are Targeting Cryptocurrency Users

 As cryptocurrency becomes more popular and the adoption rises, we see a related increase in the number of cybercrimes, fraud, and malware schemes. Criminals like to hunt and plunder where there is ...

Botnets disrupted worldwide…Operation Endgame is BACK!

Operation Endgame, “Season 2”, is officially announced as of Friday, May 23rd, 2025. International law enforcement agencies and their partners have once again joined forces to disrupt and dismantle botnet infrastructure and ...
OpenText, data, malware, backup Malware

OpenText Report Shines Spotlight on Malware Infection Rates

A 2025 cybersecurity threat report based on analysis of data collected from tens of millions of endpoints by OpenText shows that the malware infection rate for business PCs now stands at 2.39%, ...
Security Boulevard
Zimperium, network Organizations Still Don’t Get Mobile app Security

Report Exposes Soft Security Underbelly of Mobile Computing

Zimperium, this week during the 2025 RSA Conference, shared an analysis of mobile computing environments that finds more than 60% of iOS and 34% of Android apps lack basic code protection, with ...
Security Boulevard
Revived CryptoJS library is a crypto stealer in disguise

Revived CryptoJS library is a crypto stealer in disguise

An illicit npm package called 'crypto-encrypt-ts' may appear to revive the unmaintained but vastly popular CryptoJS library, but what it actually does is peek into your crypto wallet and exfiltrate your secrets ...
hospital, bowie, health care data breaches cybersecurity HealthEquity

Cybersecurity CEO Charged With Installing Malware on Hospital Computers

Jeffrey Bowie, the CEO of cybersecurity company Veritaco, was seen on security camera footage walking into St. Anthony Hospital in Oklahoma City last year and installing malware on an employee computer. He ...
Security Boulevard

Emulating the Stealthy StrelaStealer Malware

AttackIQ has released three new attack graphs designed to emulate the Tactics, Techniques, and Procedures (TTPs) associated with StrelaStealer observed in its most recent activities, enabling defenders to test and validate their ...

Domain Reputation Update Oct 2024 – Mar 2025

New domains are up 7.39%, with 2.9 million malicious domains detected. Chinese gambling sites dominate the Top 20 TLDs, while .top remains a hotspot for abuse - this time with a spike ...

Emulating the Misleading CatB Ransomware

AttackIQ has released a new attack graph designed to emulate the Tactics, Techniques, and Procedures (TTPs) associated with CatB ransomware observed in its most recent activities, enabling defenders to test and validate ...