Google led a global crackdown on IPIDEA, a sprawling proxy network that secretly hijacked millions of devices for cybercrime. Learn how malware-laced apps turned ordinary users into unwitting accomplices—and why vigilance is vital.
Matanbuchus, a notorious Malware-as-a-Service, has reinvented itself with modular upgrades and advanced evasion tactics. Learn how this evolving threat bypasses antivirus defenses and enables ransomware attacks.
A supply chain compromise of eScan’s update servers delivered malicious payloads to users globally, disabling antivirus protection and leaving thousands in urgent need of manual remediation.
Cybercriminals are leveraging hijacked Google Ads accounts to distribute malware disguised as Mac cleaning utilities, using Apple-themed landing pages and sophisticated obfuscation techniques to compromise macOS systems.
The Matanbuchus malware is rewriting the rules of digital stealth, constantly morphing its code and delivery techniques to evade antivirus tools and enable ransomware campaigns. Learn how this shape-shifting threat operates—and how defenders can respond.
In January 2026, hackers hijacked eScan’s update servers to push malware to unsuspecting users, demonstrating the dangers of supply chain attacks on trusted cybersecurity tools.
Hackers are exploiting Google search with SEO poisoning, placing fake sites at the top of results to deliver stealth malware alongside real software. Discover how the attack chain works, who's at risk, and how to stay safe.
Mustang Panda’s latest CoolClient malware variant is targeting Asian and Russian government networks with advanced infostealers and stealthy data exfiltration techniques, raising the stakes in global cyber-espionage.
A new toolkit called Stanley is turning Chrome extensions into undetectable phishing tools, letting attackers overlay fake pages on real sites while keeping the real URL visible. Even Google’s review process can’t stop these malicious add-ons, making browser-based attacks more dangerous than ever.
ClickFix attacks now use fake CAPTCHAs, Microsoft App-V scripts, and trusted web services to distribute advanced malware like Amatera Stealer. Discover how these sophisticated campaigns outsmart security tools by blending into legitimate workflows.