Robuta

https://securelist.com/financial-threat-report-2023/112526/ Financial threat report 2023: phishing, PC and mobile malware | Securelist May 6, 2024 - In this report, we share our insights into the 2023 trends and statistics on financial threats, such as phishing, PC and mobile banking malware. financial threat reportpc https://www.csoonline.com/article/3476858/ics-malware-frostygoop-disrupted-heating-in-ukraine-remains-threat-to-ot-worldwide.html ICS malware FrostyGoop disrupted heating in Ukraine, remains threat to OT worldwide | CSO Online May 6, 2025 - The malware leverages Modbus TCP communications to target operational technology assets — and can easily be repurposed to compromise other industrial... ukraine remainsicsmalware https://www.crowdstrike.com/en-us/platform/threat-intelligence/malware-analysis/ Malware Analysis | CrowdStrike Falcon® Threat Intelligence Feb 17, 2026 - Defeat malware by empowering your teams to detect, analyze, and neutralize malware with confidence. Request a demo today. malware analysiscrowdstrike https://www.ibm.com/think/x-force/introducing-x-force-malware-threat-research-public-github-repository Introducing X-Force Malware Threat Research public GitHub repository | IBM The IBM X-Force team has put together a public GitHub page where they will post all X-Force Malware Threat Research projects. What does this mean? And how can... x forcemalware threatresearch https://www.malwarepatrol.net/dns-firewall/ Malware Patrol | DNS RPZ Firewall Threat Intelligence Feed Nov 24, 2025 - Secure your DNS infrastructure with RPZ firewall threat intelligence feeds. Stop threats at the DNS layer. threat intelligence feeddns https://event.eu.on24.com/wcc/r/8000165674/C0F5DB1FF0DA9D31E8DA87D552B31B3D?partnerref=TFwebsite The Invisible Threat: How Polymorphic Malware is Outsmarting Your Email Security Thursday, November 20, 2025 at 2:00 PM Eastern Standard Time. invisible threatpolymorphic https://www.proofpoint.com/us/blog/threat-insight/security-brief-clickfix-social-engineering-technique-floods-threat-landscape ClickFix Malware & Social Engineering Threat Grows | Proofpoint US Learn how the threat of ClickFix malware is spreading through social engineering. Find out how to protect yourself from these attacks with Proofpoint. clickfix malwarethreat grows https://www.malwarepatrol.net/ Malware Patrol | Cyber Threat Intelligence Nov 24, 2025 - Malware Patrol provides real-time cyber threat intelligence that protects companies against malware, ransomware, phishing and more. cyber threat intelligence https://www.cybersecurity-insiders.com/malware-as-a-service-vs-ransomware-as-a-service-understanding-the-differences-and-threats/ Malware as a Service: Understanding the Growing Threat Nov 28, 2025 - Learn about Malware as a Service, how cybercriminals use it for attacks, and essential strategies organizations can implement to stay protected. growing threatmalwareservice https://www.theinsaneapp.com/2023/04/virustotal-code-insight.html VirusTotal Adds AI-Powered Malware Analysis For Advanced Threat Detection Apr 25, 2023 - VirusTotal introduced a new code analysis feature called Code Insight, which utilizes artificial intelligence to find virus and malwares. advanced threat detectionadds https://www.govexec.com/assets/the-data-behind-safer-open-source-supply-chain/portal/?oref=ge-sidebar-insights-reports The Federal Threat: 98% of npm & PyPI Malware Neutralized With a Source-First Approach pypi malware neutralizednpm https://tarnkappe.info/forum/t/morsecode-malware-von-microsofts-365-defender-threat-intelligence-team-entdeckt/8793 Morsecode-Malware von Microsofts 365 Defender Threat Intelligence Team entdeckt - Kommentare -... Kommentare zu folgendem Beitrag: Morsecode-Malware von Microsofts 365 Defender Threat Intelligence Team entdeckt Microsoft hat eine Analyse einer Malware... defender threat intelligence https://www.infosecurity-magazine.com/news/threat-actors-exploit-calendar-subs/ Threat Actors Exploit Calendar Subscriptions for Phishing and Malware - Infosecurity Magazine Dec 4, 2025 - BitSight research has revealed how threat actors exploit calendar subscriptions to deliver phishing links, malware and social engineering attacks through... threat actorsexploitcalendar https://www.nextgov.com/assets/the-data-behind-safer-open-source-supply-chain/portal/ The Federal Threat: 98% of npm & PyPI Malware Neutralized With a Source-First Approach pypi malware neutralizednpm https://blogs.blackberry.com/en/2017/02/threat-spotlight-disttrack-malware Threat Spotlight: Disttrack Malware Feb 21, 2017 - Disttrack is a destructive worm that targets a system’s master boot record (MBR). It has been targeting Saudi Arabia’s critical infrastructure. Threat... threatspotlightmalware https://cybersecurefox.com/en/webrat-malware-gaming-platforms-threat-analysis/ New Webrat Malware Targets Gamers And Messaging Apps: Advanced Threat Analysis Jun 8, 2025 - Cybersecurity researchers at Solar 4RAYS have uncovered a sophisticated malware strain called Webrat, which emerged in early 2025 as a significant threat to webrat malwaretargets gamers https://www.bleepingcomputer.com/news/security/multi-threat-android-malware-sturnus-steals-signal-whatsapp-messages/ Multi-threat Android malware Sturnus steals Signal, WhatsApp messages A new Android banking trojan named Sturnus can capture communication from end-to-end encrypted messaging platforms like Signal, WhatsApp, and Telegram, as... android malwaremultithreat https://securityboulevard.com/2025/10/the-unkillable-threat-how-attackers-turned-blockchain-into-bulletproof-malware-infrastructure/ The Unkillable Threat: How Attackers Turned Blockchain Into Bulletproof Malware Infrastructure -... unkillablethreatattackers https://www.techradar.com/vpn/vpn-services/ipvanish-launches-threat-protection-pro-to-stop-malware-even-when-youre-not-connected IPVanish launches Threat Protection Pro to stop malware even when you’re not connected | TechRadar Feb 2, 2026 - Powered by VIPRE antivirus tech, the tool is currently available in beta on Windows and macOS devices only threat protectionstop malware https://www.jamf.com/blog/macsync-stealer-evolution-code-signed-swift-malware-analysis/ MacSync Stealer Evolves: From ClickFix to Code-Signed Swift Malware — Jamf Threat Labs Jamf Threat Labs discovers MacSync Stealer's evolution to code-signed, notarized Swift applications that silently download and execute payloads, bypassing... macsync stealerevolvescode https://redcanary.com/threat-detection-report/trends/affiliates/ Malware Affiliates - Red Canary Threat Detection Report Mar 18, 2025 - The threat landscape continues to move toward a software-as-a-service (SaaS) economy with malware affiliates at the helm. canary threat detectionred https://www.vmray.com/resources/artificial-intelligence-cybersecurity-hype-hope-the-hard-truth/ VMRay Malware & Phishing Threat Landscape Report Jul 17, 2025 - Navigate the dynamic world of cybersecurity threats—from Windows and Linux threats to phishing trends and complex delivery chains. phishing threat landscapeamp https://www.jamf.com/blog/infostealers-pose-threat-to-macos/ Jamf Threat Labs dissects infostealer malware Learn more about how malicious threats continue to target macOS users, compromising their Macs and exfiltrating their data. jamf threat labsdissects https://www.vmray.com/resources/ais-rise-in-cybersecurity-vmrays-position/ VMRay Malware & Phishing Threat Landscape Report Jul 17, 2025 - Navigate the dynamic world of cybersecurity threats—from Windows and Linux threats to phishing trends and complex delivery chains. phishing threat landscapeamp https://www.macworld.com/article/2893767/new-sophisticated-malware-threat-may-already-be-hiding-on-your-mac.html New 'sophisticated' malware threat may already be hiding on your Mac | Macworld Sep 3, 2025 - JSCoreRunner is malware that spreads through what appears to be a free PDF converter app distributed on thew web. sophisticated malwarenewmay https://www.ibm.com/think/x-force/ibm-x-force-threat-analysis-quirkyloader IBM X-Force Threat Analysis: QuirkyLoader - A new malware loader delivering infostealers and RATs |... Watch out! There’s a new malware loader spreading additional infection to already compromised systems. Read more about QuirkyLoader and what IBM X-Force has... x forcethreat analysisibmnew https://securityaffairs.com/189880/security/north-korea-linked-threat-actors-abuse-vs-code-auto-run-to-spread-stoatwaffle-malware.html North Korea-linked threat actors abuse VS Code auto-run to spread StoatWaffle malware Mar 24, 2026 - North Korea-linked threat actors use VS Code auto-run tasks to spread StoatWaffle malware via malicious projects that execute on folder open. north koreathreat actorsabuse https://www.aquasec.com/blog/ai-generated-malware-in-panda-image-hides-persistent-linux-threat/ AI-Generated Malware in Panda Image Hides Persistent Linux Threat Sep 1, 2025 - Aqua Nautilus research uncovers Koske, a new, sophisticated AI-generated Linux malware that uses image-based delivery, rootkits, and stealthy persistence ai generatedmalwarepandaimage https://www.ipvanish.com/vpn-features/threat-protection/ Threat Protection Pro | Real-Time Malware & Phishing Security - IPVanish Mar 30, 2026 - Stop malware, phishing, ads, and trackers before they reach your device. IPVanish Threat Protection Pro delivers instant, always-on security—even without a VPN. threat protectionreal time