Back to Blog

Threat Hunting & Intel

23 posts
AgingFly campaign hits Ukrainian government and hospital networks

AgingFly campaign hits Ukrainian government and hospital networks

AgingFly campaign hits Ukrainian government and hospital networks A newly reported campaign centered on the AgingFly backdoor is a reminder that targeted intrus...

April 16, 2026
5 min read
CPUID breach turned CPU-Z and HWMonitor into a malware delivery path

CPUID breach turned CPU-Z and HWMonitor into a malware delivery path

CPUID breach turned CPU-Z and HWMonitor into a malware delivery path Executive summary A compromise of the CPUID website briefly turned trusted download links f...

April 13, 2026
5 min read
Iranian PLC Attacks Disrupt U.S. Critical Infrastructure

Iranian PLC Attacks Disrupt U.S. Critical Infrastructure

Iranian PLC Attacks Disrupt U.S. Critical Infrastructure Executive Summary Iranian-affiliated [advanced persistent threat](https://invaders.ie/resources/glossar...

April 9, 2026
7 min read
AsyncRAT SEO Poisoning Campaign Targets Software Downloads

AsyncRAT SEO Poisoning Campaign Targets Software Downloads

AsyncRAT: SEO Poisoning Hits Software Downloads | 2026 Executive Summary In March 2026, NCC Group and FOX-IT disclosed that an unknown threat actor had been run...

March 23, 2026
8 min read
ClayRat Android spyware collapse after arrest in Russia

ClayRat Android spyware collapse after arrest in Russia

ClayRat: Android spyware operation collapses after arrest | 2026 Executive Summary ClayRat is an Android spyware operation that targeted users in Russia and app...

March 23, 2026
7 min read
Namibia Airports Company breach claim raises admin-access risk

Namibia Airports Company breach claim raises admin-access risk

Namibia Airports Company breach claim raises admin-access risk | 2026 Executive Summary Namibia Airports Company (NAC) disclosed that it detected a cybersecurit...

March 21, 2026
6 min read
GlassWorm Shifts to Transitive Open VSX Dependencies in Developer Supply-Chain Push

GlassWorm Shifts to Transitive Open VSX Dependencies in Developer Supply-Chain Push

GlassWorm Shifts to Transitive Open VSX Dependencies in Developer Supply-Chain Push GlassWorm is no longer just a story about obviously malicious extensions. Th...

March 21, 2026
5 min read
Cline CLI 2.3.0 supply chain attack silently installed OpenClaw on developer systems

Cline CLI 2.3.0 supply chain attack silently installed OpenClaw on developer systems

Cline CLI 2.3.0 supply chain attack silently installed OpenClaw on developer systems Executive summary The Cline CLI supply chain incident is a practical remind...

March 19, 2026
5 min read
FBI seizes Handala sites after destructive Stryker hack

FBI seizes Handala sites after destructive Stryker hack

FBI seizes Handala sites after destructive Stryker hack | 2026 Executive Summary The FBI and U.S. Department of Justice have seized two websites linked to Handa...

March 19, 2026
6 min read
DarkSword iOS Exploit Chain Hits Multiple Threat Actors

DarkSword iOS Exploit Chain Hits Multiple Threat Actors

DarkSword iOS Exploit Chain Hits Multiple Threat Actors Executive Summary Google Threat Intelligence Group says DarkSword is a full-chain iOS [exploit](https://...

March 19, 2026
6 min read
DarkSword iOS Exploit Chain Hits Multiple Threat Actors

DarkSword iOS Exploit Chain Hits Multiple Threat Actors

DarkSword shows how iPhone zero-days spread far beyond a single operator Executive Summary Google Threat Intelligence Group says DarkSword is a full-chain iOS [...

March 19, 2026
6 min read
RondoDox botnet shifts to focused exploitation across 174 flaws

RondoDox botnet shifts to focused exploitation across 174 flaws

RondoDox botnet shifts to focused exploitation across 174 flaws The RondoDox botnet is no longer just another noisy vulnerability spray-and-pray operation. New...

March 18, 2026
5 min read