Delivering simplified cybersecurity alerts and information, ensuring you're always prepared to take immediate action.

VodkaStealer Malware Harvests Browser Credentials and Session Token
Malware

VodkaStealer Malware Harvests Browser Credentials and Session Token

Threat Group – Unidentified financially motivated threat actor associated with the ClickFix WordPress compromise campaign Threat Type – Information Stealer Exploited Vulnerabilities – ClickFix social engineering using compromised WordPress sites and fake Cloudflare verification prompts Malware Used – VodkaStealer, DoubleDonut loader, ChromElevator Threat Score – 🔴 7.6 High – Advanced credential harvesting malware delivered through large
5 min read
Microsoft Excel Vulnerability CVE-2026-26144 May Allow Data Exposure Through Copilot
Vulnerabilities

Microsoft Excel Vulnerability CVE-2026-26144 May Allow Data Exposure Through Copilot

Threat Group – Unknown / Opportunistic Threat Actors Threat Type – Information Disclosure Vulnerability Exploited Vulnerabilities – CVE-2026-26144 Malware Used – None required (AI-assisted data exfiltration via Copilot Agent) Threat Score – 7.2 🔴 High – The vulnerability enables zero interaction data leakage through an automated AI agent integrated into Microsoft Office. The flaw can be triggered
6 min read
UnsolicitedBooker Deploys MarsSnake Against Telecom Providers
Malware

UnsolicitedBooker Deploys MarsSnake Against Telecom Providers

Threat Group – UnsolicitedBooker Threat Type – Backdoor / Advanced Persistent Threat Exploited Vulnerabilities – CVE-2018-0802 Malware Used – MarsSnake, MarsSnakeLoader, LuciDoor, LuciLoad Threat Score – 8.7 🔥 Critical – State aligned espionage platform with wormable capability, decentralised IPFS command fallback, telecommunications targeting, long term persistence and advanced evasion techniques Last Threat Observation – 24 February 2026 Overview
5 min read
Evelyn Stealer and the rising risk of developer tool supply chain attacks
Malware

Evelyn Stealer and the rising risk of developer tool supply chain attacks

Threat Group: Unknown cybercriminal operators leveraging developer tooling supply chains Threat Type: Information stealer malware delivered via malicious development extensions Exploited Vulnerabilities: Abuse of the Visual Studio Code extension trust model, DLL side loading, PowerShell execution policy misuse, Windows process hollowing Malware Used: Evelyn Stealer, Lightshot.dll downloader, iknowyou.model
6 min read