https://securelist.com/financial-threat-report-2023/112526/
Financial threat report 2023: phishing, PC and mobile malware | Securelist
May 6, 2024 - In this report, we share our insights into the 2023 trends and statistics on financial threats, such as phishing, PC and mobile banking malware.
financial threat reportpc
https://www.csoonline.com/article/3476858/ics-malware-frostygoop-disrupted-heating-in-ukraine-remains-threat-to-ot-worldwide.html
ICS malware FrostyGoop disrupted heating in Ukraine, remains threat to OT worldwide | CSO Online
May 6, 2025 - The malware leverages Modbus TCP communications to target operational technology assets — and can easily be repurposed to compromise other industrial...
ukraine remainsicsmalware
https://www.crowdstrike.com/en-us/platform/threat-intelligence/malware-analysis/
Malware Analysis | CrowdStrike Falcon® Threat Intelligence
Feb 17, 2026 - Defeat malware by empowering your teams to detect, analyze, and neutralize malware with confidence. Request a demo today.
malware analysiscrowdstrike
https://www.ibm.com/think/x-force/introducing-x-force-malware-threat-research-public-github-repository
Introducing X-Force Malware Threat Research public GitHub repository | IBM
The IBM X-Force team has put together a public GitHub page where they will post all X-Force Malware Threat Research projects. What does this mean? And how can...
x forcemalware threatresearch
https://www.malwarepatrol.net/dns-firewall/
Malware Patrol | DNS RPZ Firewall Threat Intelligence Feed
Nov 24, 2025 - Secure your DNS infrastructure with RPZ firewall threat intelligence feeds. Stop threats at the DNS layer.
threat intelligence feeddns
https://event.eu.on24.com/wcc/r/8000165674/C0F5DB1FF0DA9D31E8DA87D552B31B3D?partnerref=TFwebsite
The Invisible Threat: How Polymorphic Malware is Outsmarting Your Email Security
Thursday, November 20, 2025 at 2:00 PM Eastern Standard Time.
invisible threatpolymorphic
https://www.proofpoint.com/us/blog/threat-insight/security-brief-clickfix-social-engineering-technique-floods-threat-landscape
ClickFix Malware & Social Engineering Threat Grows | Proofpoint US
Learn how the threat of ClickFix malware is spreading through social engineering. Find out how to protect yourself from these attacks with Proofpoint.
clickfix malwarethreat grows
https://www.malwarepatrol.net/
Malware Patrol | Cyber Threat Intelligence
Nov 24, 2025 - Malware Patrol provides real-time cyber threat intelligence that protects companies against malware, ransomware, phishing and more.
cyber threat intelligence
https://www.cybersecurity-insiders.com/malware-as-a-service-vs-ransomware-as-a-service-understanding-the-differences-and-threats/
Malware as a Service: Understanding the Growing Threat
Nov 28, 2025 - Learn about Malware as a Service, how cybercriminals use it for attacks, and essential strategies organizations can implement to stay protected.
growing threatmalwareservice
https://www.theinsaneapp.com/2023/04/virustotal-code-insight.html
VirusTotal Adds AI-Powered Malware Analysis For Advanced Threat Detection
Apr 25, 2023 - VirusTotal introduced a new code analysis feature called Code Insight, which utilizes artificial intelligence to find virus and malwares.
advanced threat detectionadds
https://www.govexec.com/assets/the-data-behind-safer-open-source-supply-chain/portal/?oref=ge-sidebar-insights-reports
The Federal Threat: 98% of npm & PyPI Malware Neutralized With a Source-First Approach
pypi malware neutralizednpm
https://tarnkappe.info/forum/t/morsecode-malware-von-microsofts-365-defender-threat-intelligence-team-entdeckt/8793
Morsecode-Malware von Microsofts 365 Defender Threat Intelligence Team entdeckt - Kommentare -...
Kommentare zu folgendem Beitrag: Morsecode-Malware von Microsofts 365 Defender Threat Intelligence Team entdeckt Microsoft hat eine Analyse einer Malware...
defender threat intelligence
https://www.infosecurity-magazine.com/news/threat-actors-exploit-calendar-subs/
Threat Actors Exploit Calendar Subscriptions for Phishing and Malware - Infosecurity Magazine
Dec 4, 2025 - BitSight research has revealed how threat actors exploit calendar subscriptions to deliver phishing links, malware and social engineering attacks through...
threat actorsexploitcalendar
https://www.nextgov.com/assets/the-data-behind-safer-open-source-supply-chain/portal/
The Federal Threat: 98% of npm & PyPI Malware Neutralized With a Source-First Approach
pypi malware neutralizednpm
https://blogs.blackberry.com/en/2017/02/threat-spotlight-disttrack-malware
Threat Spotlight: Disttrack Malware
Feb 21, 2017 - Disttrack is a destructive worm that targets a system’s master boot record (MBR). It has been targeting Saudi Arabia’s critical infrastructure. Threat...
threatspotlightmalware
https://cybersecurefox.com/en/webrat-malware-gaming-platforms-threat-analysis/
New Webrat Malware Targets Gamers And Messaging Apps: Advanced Threat Analysis
Jun 8, 2025 - Cybersecurity researchers at Solar 4RAYS have uncovered a sophisticated malware strain called Webrat, which emerged in early 2025 as a significant threat to
webrat malwaretargets gamers
https://www.bleepingcomputer.com/news/security/multi-threat-android-malware-sturnus-steals-signal-whatsapp-messages/
Multi-threat Android malware Sturnus steals Signal, WhatsApp messages
A new Android banking trojan named Sturnus can capture communication from end-to-end encrypted messaging platforms like Signal, WhatsApp, and Telegram, as...
android malwaremultithreat
https://securityboulevard.com/2025/10/the-unkillable-threat-how-attackers-turned-blockchain-into-bulletproof-malware-infrastructure/
The Unkillable Threat: How Attackers Turned Blockchain Into Bulletproof Malware Infrastructure -...
unkillablethreatattackers
https://www.techradar.com/vpn/vpn-services/ipvanish-launches-threat-protection-pro-to-stop-malware-even-when-youre-not-connected
IPVanish launches Threat Protection Pro to stop malware even when you’re not connected | TechRadar
Feb 2, 2026 - Powered by VIPRE antivirus tech, the tool is currently available in beta on Windows and macOS devices only
threat protectionstop malware
https://www.jamf.com/blog/macsync-stealer-evolution-code-signed-swift-malware-analysis/
MacSync Stealer Evolves: From ClickFix to Code-Signed Swift Malware — Jamf Threat Labs
Jamf Threat Labs discovers MacSync Stealer's evolution to code-signed, notarized Swift applications that silently download and execute payloads, bypassing...
macsync stealerevolvescode
https://redcanary.com/threat-detection-report/trends/affiliates/
Malware Affiliates - Red Canary Threat Detection Report
Mar 18, 2025 - The threat landscape continues to move toward a software-as-a-service (SaaS) economy with malware affiliates at the helm.
canary threat detectionred
https://www.vmray.com/resources/artificial-intelligence-cybersecurity-hype-hope-the-hard-truth/
VMRay Malware & Phishing Threat Landscape Report
Jul 17, 2025 - Navigate the dynamic world of cybersecurity threats—from Windows and Linux threats to phishing trends and complex delivery chains.
phishing threat landscapeamp
https://www.jamf.com/blog/infostealers-pose-threat-to-macos/
Jamf Threat Labs dissects infostealer malware
Learn more about how malicious threats continue to target macOS users, compromising their Macs and exfiltrating their data.
jamf threat labsdissects
https://www.vmray.com/resources/ais-rise-in-cybersecurity-vmrays-position/
VMRay Malware & Phishing Threat Landscape Report
Jul 17, 2025 - Navigate the dynamic world of cybersecurity threats—from Windows and Linux threats to phishing trends and complex delivery chains.
phishing threat landscapeamp
https://www.macworld.com/article/2893767/new-sophisticated-malware-threat-may-already-be-hiding-on-your-mac.html
New 'sophisticated' malware threat may already be hiding on your Mac | Macworld
Sep 3, 2025 - JSCoreRunner is malware that spreads through what appears to be a free PDF converter app distributed on thew web.
sophisticated malwarenewmay
https://www.ibm.com/think/x-force/ibm-x-force-threat-analysis-quirkyloader
IBM X-Force Threat Analysis: QuirkyLoader - A new malware loader delivering infostealers and RATs |...
Watch out! There’s a new malware loader spreading additional infection to already compromised systems. Read more about QuirkyLoader and what IBM X-Force has...
x forcethreat analysisibmnew
https://securityaffairs.com/189880/security/north-korea-linked-threat-actors-abuse-vs-code-auto-run-to-spread-stoatwaffle-malware.html
North Korea-linked threat actors abuse VS Code auto-run to spread StoatWaffle malware
Mar 24, 2026 - North Korea-linked threat actors use VS Code auto-run tasks to spread StoatWaffle malware via malicious projects that execute on folder open.
north koreathreat actorsabuse
https://www.aquasec.com/blog/ai-generated-malware-in-panda-image-hides-persistent-linux-threat/
AI-Generated Malware in Panda Image Hides Persistent Linux Threat
Sep 1, 2025 - Aqua Nautilus research uncovers Koske, a new, sophisticated AI-generated Linux malware that uses image-based delivery, rootkits, and stealthy persistence
ai generatedmalwarepandaimage
https://www.ipvanish.com/vpn-features/threat-protection/
Threat Protection Pro | Real-Time Malware & Phishing Security - IPVanish
Mar 30, 2026 - Stop malware, phishing, ads, and trackers before they reach your device. IPVanish Threat Protection Pro delivers instant, always-on security—even without a VPN.
threat protectionreal time