Tag: malware
Tech Time Warp: The Conficker case study
Conficker was a nasty piece of malware that first emerged on the scene in November 2008. By April 1, 2009, many security experts and computer users were bracing themselves for the worst: a predicted “menacing” new phase as machines infected...
Cybersecurity Threat Advisory: PureLog Stealer malware campaign
A new malware campaign is using deceptive copyright infringement notices to distribute PureLog Stealer, targeting organizations across multiple sectors and countries. The malware operates primarily in memory and employs evasion techniques such as DLL sideloading to bypass traditional security controls....
Cybersecurity Threat Advisory: “Zombie ZIP” archive evasion technique
A new evasion technique known as Zombie ZIP is exposing blind spots in how security tools scan archived files. By manipulating ZIP metadata, attackers can conceal malware inside archives that appear corrupted but still deliver payloads on compromised systems. Review...
Cybersecurity Threat Advisory: Malware campaign targeting HR workflows
A new malware campaign known as BlackSanta is actively targeting HR and recruitment personnel through realistic job‑related lures and weaponized documents. Once victims open malicious files, the malware deploys a highly capable EDR‑killer designed to disable endpoint protection before delivering...
Cybersecurity Threat Advisory: PromptSpy Android malware abusing Google Gemini AI
Reported by SecurityWeek on February 20, 2026, PromptSpy is a newly identified Android malware family developed by threat actors. Its standout capability is using Google Gemini at runtime to analyze on‑screen content and help the malware remain installed and active...
Cybersecurity Threat Advisory: Tsundere Bot malware loader
A new malware loader, Tsundere Bot, is increasingly used by criminal Initial Access Brokers (IABs) to compromise corporate environments and pave the way for ransomware attacks. Recent public reporting links Tsundere Bot to ClickFix‑style phishing, malicious loaders delivered through user...
Cybersecurity Threat Advisory: TamperedChef—Malicious PDF editing application
TamperedChef is an information‑stealing malware distributed through a trojanized PDF editing tool called AppSuite PDF Editor. The application is promoted using malicious websites and Google Ads, enticing users to download what appears to be a legitimate installer. Review this Cybersecurity...
Cybersecurity Threat Advisory: New SantaStealer malware
A new malware-as-a-service (MaaS) info-stealer, SantaStealer, is actively promoted on Telegram and underground forums, with operators reportedly beginning its release ahead of year-end 2025. Read this Cybersecurity Threat Advisory to learn how to reduce your risk from this emerging threat....
Tech Time Warp: Three scream-inducing examples of historical malware
Malware is one of the managed service provider’s (MSP’s) worst professional nightmares, so it’s no wonder so many viruses have names that sound like horror movies. In honor of Halloween, let’s take a look at this rogue’s gallery of malware,...
Cybersecurity Threat Advisory: ChaosBot malware exploits Discord
A recently discovered Rust-based malware called ChaosBot is being used compromise computers via Discord channels. Review the details within this Cybersecurity Threat Advisory to learn more and see how to protect your system. What is the threat? ChaosBot is a...
