Tag: malware

Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Malware campaign targeting HR workflows

Cybersecurity Threat Advisory: Malware campaign targeting HR workflows

A new malware campaign known as BlackSanta is actively targeting HR and recruitment personnel through realistic job‑related lures and weaponized documents. Once victims open malicious files, the malware deploys a highly capable EDR‑killer designed to disable endpoint protection before delivering...

/ March 12, 2026
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: PromptSpy Android malware abusing Google Gemini AI

Cybersecurity Threat Advisory: PromptSpy Android malware abusing Google Gemini AI

Reported by SecurityWeek on February 20, 2026, PromptSpy is a newly identified Android malware family developed by threat actors. Its standout capability is using Google Gemini at runtime to analyze on‑screen content and help the malware remain installed and active...

/ March 2, 2026
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Tsundere Bot malware loader

Cybersecurity Threat Advisory: Tsundere Bot malware loader

A new malware loader, Tsundere Bot, is increasingly used by criminal Initial Access Brokers (IABs) to compromise corporate environments and pave the way for ransomware attacks. Recent public reporting links Tsundere Bot to ClickFix‑style phishing, malicious loaders delivered through user...

/ February 3, 2026
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: TamperedChef—Malicious PDF editing application

Cybersecurity Threat Advisory: TamperedChef—Malicious PDF editing application

TamperedChef is an information‑stealing malware distributed through a trojanized PDF editing tool called AppSuite PDF Editor. The application is promoted using malicious websites and Google Ads, enticing users to download what appears to be a legitimate installer. Review this Cybersecurity...

/ January 30, 2026
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: New SantaStealer malware

Cybersecurity Threat Advisory: New SantaStealer malware

A new malware-as-a-service (MaaS) info-stealer, SantaStealer, is actively promoted on Telegram and underground forums, with operators reportedly beginning its release ahead of year-end 2025. Read this Cybersecurity Threat Advisory to learn how to reduce your risk from this emerging threat....

/ December 24, 2025
Tech Time Warp
Tech Time Warp: Three scream-inducing examples of historical malware

Tech Time Warp: Three scream-inducing examples of historical malware

Malware is one of the managed service provider’s (MSP’s) worst professional nightmares, so it’s no wonder so many viruses have names that sound like horror movies. In honor of Halloween, let’s take a look at this rogue’s gallery of malware,...

/ October 31, 2025
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: ChaosBot malware exploits Discord

Cybersecurity Threat Advisory: ChaosBot malware exploits Discord

A recently discovered Rust-based malware called ChaosBot is being used compromise computers via Discord channels. Review the details within this Cybersecurity Threat Advisory to learn more and see how to protect your system. What is the threat? ChaosBot is a...

/ October 16, 2025
Tech Time Warp
Tech Time Warp: 25 years of exploiting poor Pikachu

Tech Time Warp: 25 years of exploiting poor Pikachu

One of the first pieces of malware designed to target children turns 25 this month. Take a look back in this edition of Tech Time Warp. First detected in June 2000, the Pikachu Pokémon or “Pokey” virus played on a...

/ June 27, 2025
Tech Time Warp
Tech Time Warp: The 10-day takeover of a botnet

Tech Time Warp: The 10-day takeover of a botnet

In 2009, researchers from the University of California, Santa Barbara, outsmarted the cybercriminals behind the notorious Torpig botnet. They uncovered critical knowledge about how this type of malware works. Learn how in this edition of Tech Time Warp. Researchers first...

/ March 21, 2025
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Check Point’s flaw under active exploitation

Cybersecurity Threat Advisory: Check Point’s flaw under active exploitation

A threat cluster dubbed “Green Nailao” is targeting European organizations, particularly in the healthcare sector, using Check Point Network Gateway Security vulnerability, CVE-2024-24919.  Continue reading this Cybersecurity Threat Advisory to learn how to mitigate your risk. What is the threat?...

/ February 25, 2025