Sign up
Login
MALWARE
//
THREAT ACTORS
//
VULNERABILITIES
2601
Malware Objects
31031
Documents talking Malware
50
Active Sources
10
Updates so far today
Hot threats you should care about.
CVE-2023-46805
Fudmodule
Alphv
Moobot
Akira
3 updates this week.
100%
ransomware
vulnerability
windows
ransom
vpn
linux
raas
alphv
clop
exploit
+200 other associations
Akira is a potent ransomware that has been active since 2023, known for its aggressive encryption tactics and swift deployment. This malware, which brings a unique '80s aesthetic to the dark web, has quickly risen in prominence within the cybercrime landscape. It has targeted hundreds of victims glo
AsyncRAT
3 updates this week.
140%
malware
payload
rat
loader
source
remcos
trojan
phishing
njrat
scheduled task
+102 other associations
AsyncRAT is a malicious software (malware) that infiltrates systems through suspicious downloads, emails, or websites, often unbeknownst to the user. Once inside, it can steal personal information, disrupt operations, or even hold your data hostage for ransom. It has recently risen to prominence, ra
NotPetya
3 updates this week.
300%
malware
ransomware
wannacry
merck
ukraine
wiper
petya
industroyer
insurance
sandworm
+88 other associations
NotPetya is a destructive malware that posed as ransomware, causing significant global damage in 2017. Despite its appearance as ransomware, NotPetya was not designed to extort money but rather to destroy data and disrupt operations, particularly targeting Ukraine's infrastructure. NotPetya was attr
petya
3 updates this week.
300%
ransomware
malware
petya
encryption
wannacry
encrypt
mft
exploit
petrwrap
goldeneye
+37 other associations
Petya is a type of malware, specifically ransomware, that infected Windows-based systems primarily through phishing emails. It was notorious for its ability to disrupt operations and hold data hostage for ransom. Petya, along with other types of ransomware like WannaCry, NotPetya, TeslaCrypt, and Da
Blacklotus
3 updates this week.
300%
bootkit
vulnerability
cve-2022-21894
exploit
malware
windows
microsoft
cve-2023-24932
exploited
flaw
+33 other associations
BlackLotus is a harmful malware that targets the Unified Extensible Firmware Interface (UEFI) and Secure Boot systems, exploiting their vulnerabilities to gain persistent kernel access and privileges. It was first detected in 2022 when security researchers discovered a UEFI bootkit being sold on hac
Hunters
3 updates this week.
100%
ransomware
lapsus
extortion
malware
hunters inte...
hive
telegram
hive ransomw...
ransom
vulnerability
+64 other associations
Malware hunters, often referred to as bug hunters, play a critical role in cybersecurity by identifying and addressing vulnerabilities in software systems. In 2023, these professionals proved their worth at the Pwn2Own Toronto event where they identified 58 unique zero-day vulnerabilities, earning a
Bootkitty
3 updates this week.
300%
linux
bootkit
malware
firmware
ubuntu
exploit
alphv
windows
blacklotus
cve-2020-26200
+4 other associations
Hiddengh0st
2 updates this week.
300%
malware