Sign up
Login
MALWARE
//
THREAT ACTORS
//
VULNERABILITIES
2601
Malware Objects
31238
Documents talking Malware
50
Active Sources
0
Updates so far today
Hot threats you should care about.
CVE-2023-46805
Fudmodule
Alphv
Moobot
Clop
6 updates this week.
41.18%
ransomware
exploit
vulnerability
moveit
lockbit
mft
ransom
extortion
cve-2023-34362
exploited
+301 other associations
Clop, a malicious software (malware), is linked to a Russian-speaking cybercriminal group also known as Cl0p. It is designed to exploit and damage computer systems by stealing personal information, disrupting operations, or holding data hostage for ransom. In May 2023, the Clop group began exploitin
Rover
4 updates this week.
33.33%
backdoor
sidewinder
confucius
uk
government
bitcoin
fraud
scattered sp...
malware
police
+50 other associations
Rover is a malicious software (malware) that has the potential to exploit and damage computer systems or devices. It can infiltrate systems through suspicious downloads, emails, or websites, often unbeknownst to the user. Once inside, Rover can steal personal information, disrupt operations, or even
Disco
3 updates this week.
300%
malware
nightclub
cisco
exploit
cve-2025-20352
rootkit
implant
+8 other associations
DisCo is a malware that emerged as a significant threat in the cybersecurity landscape. It's a harmful program designed to exploit and damage computer systems, often infiltrating them without the user's knowledge through suspicious downloads, emails, or websites. Unlike conventional malicious softwa
Mango
2 updates this week.
300%
malware
chrome
ransomware
+18 other associations
Mango is a sophisticated malware that was first detected in an executable named BOOSTWRITE, which was uploaded to VirusTotal on October 3. The code of this executable was signed using a certificate issued by MANGO ENTERPRISE LIMITED, indicating that the operators behind Mango were actively modifying
Astaroth
2 updates this week.
300%
malware
phishing
trojan
payload
ousaban
google
cisco
banking
exploit
evasive
+18 other associations
Astaroth, a notorious information-stealing banking trojan, has continued to evolve and remains a significant threat. Known for its sophisticated evasive skills, Astaroth is typically spread through spear phishing emails, such as the one identified by a threat hunter on Twitter. Once it infects a sys
Hunters
2 updates this week.
-38.46%
lapsus
ransomware
extortion
malware
exploit
hive
cybercrime
hunters inte...
ransom
google
+75 other associations
Malware hunters, often referred to as bug hunters, play a critical role in cybersecurity by identifying and addressing vulnerabilities in software systems. In 2023, these professionals proved their worth at the Pwn2Own Toronto event where they identified 58 unique zero-day vulnerabilities, earning a
Xworm
1 updates this week.
100%
malware
rat
payload
remcos
trojan
asyncrat
agenttesla
ransomware
windows
github
+65 other associations
XWorm is a sophisticated piece of malware designed to infiltrate and exploit computer systems, often without the user's knowledge. It can be delivered through various means such as suspicious downloads, emails, or websites, and once inside a system, it can steal personal information, disrupt operati
AsyncRAT
1 updates this week.
100%
malware
rat
loader
payload
trojan
remcos
source
phishing
dcrat
asyncrat
+102 other associations
AsyncRAT is a malicious software (malware) that infiltrates systems through suspicious downloads, emails, or websites, often unbeknownst to the user. Once inside, it can steal personal information, disrupt operations, or even hold your data hostage for ransom. It has recently risen to prominence, ra