Emerging Threats

Hackers use GitHub profiles to pose as 1Password and other apps: Header image
GitHub, the popular software platform used by over 100 million developers, is the latest target of a Russian-speaking coordinated cybercriminal campaign of malware distribution.  GitHub allows a global community of software developers to...
May 23, 2024
6 min read
With Lockbit disrupted by law enforcement and ALPHV (BlackCat) staging its own exit to escape mounting pressure from international agencies, the ransomware underground is in a state of flux. The question has been...
May 17, 2024
7 min read
Information stealers targeting Mac users are nothing new. In fact, they have become a steadily growing trend in the past 2 years. What is new is a combination of stealer and spyware, which...
May 10, 2024
7 min read
AMOS stealer is being spread via fake Web3 games: Header image
From impersonating Slack to promoting fake websites on Google Search and Google Ads, stealing information on Telegram, posing as fake browser updates, and more, Atomic Stealer (AMOS) has been shape-shifting in the past...
Apr 23, 2024
6 min read
LightSpy malware is back, and it's spying on iPhone users: Header image
LightSpy, a sophisticated piece of iOS malware first discovered in 2020, is making a big comeback, targeting iPhone users in Asia as geopolitical tensions in the region increase.  International media broke the news...
Apr 18, 2024
6 min read
Facebook ads posing as Midjourney and ChatGPT spread malware: Header image
As GenAI becomes multi-modal, the hype of image and video AI generators has captivated the world. Millions of users worldwide flock to OpenAI’s website to check out Sora, while others turn to Midjourney....
Apr 11, 2024
6 min read
New phishing attack targets iPhone users via iMessage: Header image
A new Chinese platform is taking phishing to the next level by providing cybercriminals with advanced technologies and resources to launch attacks. On March 27, Netcraft reported that the platform “darcula” is a...
Apr 5, 2024
5 min read
New GoFetch vulnerability in Apple's chips can leak secret keys: Header image
While software, web, apps, and API exploits rely entirely on malware and malicious content to launch attacks, hardware vulnerabilities can be more dangerous, as they cannot be virtually patched so easily. Researchers from...
Mar 29, 2024
5 min read
Zero-click worm can exploit ChatGPT, Gemini, and other AI tools: Header image
In 1988, a Cornell University student unleashed the Morris worm — a piece of malware considered to this day to be one of the most significant events in the history of computing. Spreading...
Mar 7, 2024
6 min read
Self-destructing macOS stealer is targeting wallets and cookies: Header image
Mac stealer malware continues to increase and is becoming one of the biggest threats in Apple environments. As Moonlock reported in early 2024, stealers rank high in the top 10 macOS security threats for...
Mar 5, 2024
4 min read