A cyber campaign targeting East Asian elites leveraged fake web services. DNS forensics uncovered suspicious domains, IP links, and signs of future infrastructure repurposing.
Researchers tracked three Lazarus-linked RATs to a vast DNS network, uncovering dormant domains, geolocated IPs, and artifacts tied to financial and cryptocurrency sector intrusions.
Guardio reported about the ClickFix stealer that is considered an evolved version of fake browser updates. Instead of relying on a file download, it used fake CAPTCHA pages that allowed it to evade detection more effectively.
Koi Security recently dove into the widely executed and highly coordinated GreedyBear crypto theft attack that used 150 weaponized Firefox extensions. According to the company, it utilized close to 500 malicious executables and dozens of phishing sites. The result? The threat actors have amassed more than US$1 million to date.
WhoisXML API is proud to announce the launch of the TLD RDAP Monitor, an intuitive dashboard that constantly monitors the range of adoption of the Registration Data Access Protocol (RDAP) across 1,440 top-level domains (TLDs).
Cybercriminals behind the JSCEAL campaign exploited malicious ads to spread fake crypto trading apps, generating millions of views and DNS activity across Europe in 2025. Check Point Research uncovered 94 domains as IoCs, exposing extensive DNS abuse, typosquatting, and infrastructure links fueling this large-scale, deception-driven cyber threat.
In "Soco404: Multiplatform Cryptomining Campaign Uses Fake Error Pages to Hide Payload," Wiz analyzed a campaign exploiting cloud environment vulnerabilities and misconfigurations to deploy cryptominers. Soco404 payloads were embedded in fake 404 HTML pages hosted on websites built using Google Sites. Google has taken down the sites since their reporting.
Cyber threats are escalating in scale and sophistication, driven by AI and growing regulatory pressure. CSC's CISO Outlook 2025 reveals how domain-based attacks are testing security teams - and why stronger governance, strategic investment, and trusted partnerships are critical for resilience. Download the full report to navigate what lies ahead.
A whopping 600 million cyberattacks every single day - that's what organizations face nowadays, according to the Microsoft Digital Defense Report. The sheer volume of threats, coupled with the expanding attack surfaces resulting from digital transformation, scaling, and other factors, has made attack surface monitoring a must even for organizations that were previously happy with a more traditional vulnerability management approach.
In the recently published "Top 10 Malware Q2 2025," the Center for Internet Security (CIS) Cyber Threat Intelligence (CTI) Team named the top 10 malware for the quarter, along with their corresponding indicators of compromise (IoCs).