Search
Search
Sign up
Login
MALWARE
//
THREAT ACTORS
//
VULNERABILITIES
2497
Malware Objects
28959
Documents talking Malware
50
Active Sources
13
Updates so far today
Hot threats you should care about.
CVE-2023-46805
Fudmodule
Alphv
Moobot
WhisperGate
6 updates this week.
300%
malware
wiper
ransomware
ukrainian
russia
ukraine
blizzard
hermeticwiper
caddywiper
cadet blizzard
+31 other associations
WhisperGate is a destructive malware, first identified by Microsoft in January 2022, that has been used to target Ukrainian organizations including government, non-profit, and IT entities. This malicious software operates as a wiper disguised as ransomware, causing significant damage to computer sys
Clntend
5 updates this week.
300%
tool
malware
rat
cxclnt
CLNTEND is a recently discovered malware, specifically a Remote Access Tool (RAT), that was first identified in April. It's designed to support a wide range of network protocols for communication, making it a versatile and potent threat. This malicious software can infiltrate systems through suspici
Pegasus
4 updates this week.
128.6%
spyware
ios
malware
predator
zero-day
exploit
nso group
apple
whatsapp
vulnerability
+119 other associations
Pegasus is a highly potent malware developed by NSO Group, an Israeli cybersecurity firm. It is designed to infiltrate systems and collect sensitive data, often used for targeted surveillance. This malicious software has been notoriously deployed by oppressive regimes to spy on political dissidents,
Predator
4 updates this week.
300%
predator
malware
spyware
exploit
predator spy...
exploits
intellexa
ios
zero-day
android
+92 other associations
Predator is a malicious software (malware) that has recently re-emerged as a significant threat to cyber security. It infiltrates systems through suspicious downloads, emails, or websites, often without the user's knowledge, and can steal personal information, disrupt operations, or even hold data h
Cxclnt
4 updates this week.
300%
malware
cxclnt
CXCLNT is a potent malware used by a previously undocumented threat group to exploit and damage computer systems. The malware has the ability to upload and download files, clear traces of its presence, collect victim information such as file listings and computer names, and download additional porta
Akira
4 updates this week.
100%
ransomware
windows
ransom
vulnerability
vpn
linux
alphv
extortion
exploit
encryption
+165 other associations
Akira is a malicious software known for its persistent and damaging attacks on various systems. This ransomware has been active since at least 2023, as reported by Sophos, and it operates by infiltrating systems often through suspicious downloads, emails, or websites, encrypting data, and demanding
Predator Spyware
4 updates this week.
220%
spyware
predator spy...
zero-day
exploit
android
chrome
malware
ios
cve-2023-41991
government
+43 other associations
Predator Spyware, a type of malware designed to exploit and damage computer systems, has recently been used to infiltrate devices in Egypt. This malicious software, created by Greece-based firm Intellexa, was able to infect systems through the exploitation of newly patched zero-day vulnerabilities i
Stately Taurus
2 updates this week.
300%
mustang panda
camaro dragon
government
apt
malware
backdoor
earth preta
chinese
gamaredon
aqua blizzard
+21 other associations
Stately Taurus is a sophisticated malware associated with a Chinese Advanced Persistent Threat (APT) group that conducts cyberespionage campaigns. This group has been observed targeting government entities, as well as religious and non-governmental organizations across Europe and Asia. The malware i