Tag: malware
Cybersecurity Threat Advisory: Malware campaign targeting HR workflows
A new malware campaign known as BlackSanta is actively targeting HR and recruitment personnel through realistic job‑related lures and weaponized documents. Once victims open malicious files, the malware deploys a highly capable EDR‑killer designed to disable endpoint protection before delivering...
Cybersecurity Threat Advisory: PromptSpy Android malware abusing Google Gemini AI
Reported by SecurityWeek on February 20, 2026, PromptSpy is a newly identified Android malware family developed by threat actors. Its standout capability is using Google Gemini at runtime to analyze on‑screen content and help the malware remain installed and active...
Cybersecurity Threat Advisory: Tsundere Bot malware loader
A new malware loader, Tsundere Bot, is increasingly used by criminal Initial Access Brokers (IABs) to compromise corporate environments and pave the way for ransomware attacks. Recent public reporting links Tsundere Bot to ClickFix‑style phishing, malicious loaders delivered through user...
Cybersecurity Threat Advisory: TamperedChef—Malicious PDF editing application
TamperedChef is an information‑stealing malware distributed through a trojanized PDF editing tool called AppSuite PDF Editor. The application is promoted using malicious websites and Google Ads, enticing users to download what appears to be a legitimate installer. Review this Cybersecurity...
Cybersecurity Threat Advisory: New SantaStealer malware
A new malware-as-a-service (MaaS) info-stealer, SantaStealer, is actively promoted on Telegram and underground forums, with operators reportedly beginning its release ahead of year-end 2025. Read this Cybersecurity Threat Advisory to learn how to reduce your risk from this emerging threat....
Tech Time Warp: Three scream-inducing examples of historical malware
Malware is one of the managed service provider’s (MSP’s) worst professional nightmares, so it’s no wonder so many viruses have names that sound like horror movies. In honor of Halloween, let’s take a look at this rogue’s gallery of malware,...
Cybersecurity Threat Advisory: ChaosBot malware exploits Discord
A recently discovered Rust-based malware called ChaosBot is being used compromise computers via Discord channels. Review the details within this Cybersecurity Threat Advisory to learn more and see how to protect your system. What is the threat? ChaosBot is a...
Tech Time Warp: 25 years of exploiting poor Pikachu
One of the first pieces of malware designed to target children turns 25 this month. Take a look back in this edition of Tech Time Warp. First detected in June 2000, the Pikachu Pokémon or “Pokey” virus played on a...
Tech Time Warp: The 10-day takeover of a botnet
In 2009, researchers from the University of California, Santa Barbara, outsmarted the cybercriminals behind the notorious Torpig botnet. They uncovered critical knowledge about how this type of malware works. Learn how in this edition of Tech Time Warp. Researchers first...
Cybersecurity Threat Advisory: Check Point’s flaw under active exploitation
A threat cluster dubbed “Green Nailao” is targeting European organizations, particularly in the healthcare sector, using Check Point Network Gateway Security vulnerability, CVE-2024-24919. Continue reading this Cybersecurity Threat Advisory to learn how to mitigate your risk. What is the threat?...
