Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How Cybercriminals Bypass Your Defenses (And How to Stop Them)

Malware can seriously disrupt a computer's functionality. Performance issues are only the beginning, with the worst cases involving credential theft, data theft, or monetary theft. Malware is annoying, but it can also be dangerous. Simply put, you don't want malware to make its way onto your devices. That's what antivirus software is for.

Widespread Installation of Calendaromatic Adware Includes Homoglyph Channel

Kroll has recently seen a widespread installation of an application called Calendaromatic, that Kroll Threat Intelligence (TI) is currently classifying as a potentially unwanted program (adware) but displays some functionality that gives it the potential to conduct more malicious behaviors.

Agentic AI Ransomware: What You Need to Know

Brace yourself for agentic AI ransomware. It's a terrifying fusion of cutting-edge tech and malicious intent that's set to redefine cyber threats as we know them. Unlike traditional ransomware, which follows pre-programmed rules, agentic AI ransomware can adapt its behavior in real-time based on its environment and the defenses it encounters.

AI Sidebar Spoofing Attack: SquareX Uncovers Malicious Extensions that Impersonate AI Browser Sidebars

SquareX released critical research exposing a new class of attack targeting AI browsers. The AI Sidebar Spoofing attack leverages malicious browser extensions to impersonate trusted AI sidebar interfaces, which is used to trick users into executing dangerous commands that can lead to credential theft, device hijacking, and password exfiltration.

Dual-Platform Backdoor from a South Asian Threat Group: StealthServer

In my ongoing monitoring of cyber threats in South Asia, I’ve encountered a series of advanced persistent threat (APT) activities. This region has long been a hotspot for sophisticated cyberattacks, with various groups ramping up their operations in terms of frequency and technical complexity. Starting from early July, I’ve captured multiple new malware samples targeting both Windows and Linux platforms.

Why Infostealer Malware Demands a New Defense Strategy

Modern breaches rarely begin with a brute-force attack on a firewall, they now start with a user login. Valid account credentials are now a top initial access vector, responsible for 30% of all intrusions. In this post, we address a common misconception surrounding the inforstealer malware that may be putting you at risk of a data breach.