New TrickMo Variant Uses TON C2, SOCKS5 for Android PivotingBy Staff WriterMay 12, 2026 Fast Facts The new TrickMo Android banking trojan uses decentralized TON blockchain for covert command-and-control,…
TCLBANKER Trojan Uses WhatsApp, Outlook to Target Financial PlatformsBy Staff WriterMay 8, 2026 Top Highlights TCLBANKER, a sophisticated Brazilian banking trojan, uses environment checks, anti-analysis techniques, and signed…
MuddyWater Uses Teams to Steal Credentials in Ransomware AttackBy Staff WriterMay 6, 2026 Top Highlights Iranian-backed groups like MuddyWater are deploying sophisticated social engineering via Microsoft Teams and…
Windows Phone exploited via CloudZ RAT for credential theftBy Staff WriterMay 6, 2026 Quick Takeaways Threat actors used CloudZ RAT and a new Pheno plugin to hijack Microsoft…
March 2026 Phishing Surge: Sophisticated Tactics & New VulnerabilitiesBy Staff WriterApril 21, 2026 Summary Points Trojans remain the leading attachment-based threat, accounting for 21% of incidents in March…