
Read all Blogs from this Author
A new malware campaign is exploiting Ramadan shopping sentiment, luring Middle East users with fake discount coupons from trusted brands. Behind the offer lies a multi-stage attack that deploys a powerful RAT, enabling full system control and stealthy data exfiltration via AWS. The campaign highlights how seasonal themes and trusted brands are being weaponized at scale.
Pakistan-linked APT36 (Transparent Tribe) launched a new cyber-espionage campaign targeting Indian government and defense entities. Active in August 2025, the group used phishing ZIP files containing malicious Linux “.desktop” shortcuts that downloaded payloads from Google Drive. The malware created persistence, evaded detection, and connected to a WebSocket C2 server (seemysitelive[.]store). Investigators urge blocking the C2 domain, scanning for indicators of compromise, and tightening email and endpoint defenses.
Read all Whitepapers and reports from this Author

The 2024 Canadian Threat Landscape Report highlights a significant rise in cyber threats targeting businesses and institutions across the country. With ransomware attacks from groups like LockBit and Cl0p, data breaches affecting prominent organizations, and hacktivist activities targeting government entities, Canada faces an escalating cybersecurity challenge. Key industries like finance, retail, telecommunications, and e-commerce are at heightened risk, with vulnerabilities in WordPress plugins and Interac e-Transfers being exploited. The report emphasizes the importance of proactive measures such as dark web monitoring, security awareness training, and robust incident response plans to protect against this evolving cybercriminal ecosystem.
Read MoreRead all knowledge base articles from this Author