Skip to content
Threat Digest
Explainers Data Breaches Vulnerabilities & CVEs Ransomware & Malware
Nation-State Threats Security Tools Compliance & Policy Cloud Security Threat Intelligence

#malware-analysis

Abstract depiction of network traffic with a hidden threat element.
Nation-State Threats

[2026] China-Linked Hackers Use New TencShell Malware

Forget custom code; China-linked hackers are now building on open-source tools. The new TencShell malware is a prime example, lurking in plain sight.

5 min read 1 week, 1 day ago
Abstract digital network graphic with glowing nodes and lines, representing cyber threat propagation.
Ransomware & Malware

TCLBANKER: AI's Banking Trojan Debut?

Forget clunky phishing emails. A new banking trojan, TCLBANKER, is arriving via WhatsApp and Outlook worms, acting like a digital wildfire through your contacts. It's a stark reminder that the age of simple malware is over.

6 min read 2 weeks ago
Digital circuit board with glowing red data nodes and binary code streams, symbolizing cyber threat and data destruction.
Ransomware & Malware

VECT 2.0: The Ransomware That Just Destroys, Not Encrypts

Imagine paying a thief only to find they've smashed your valuables beyond repair. That's the terrifying reality of VECT 2.0, a ransomware that acts like a digital sledgehammer, crushing data instead of locking it.

5 min read 3 weeks, 3 days ago
Stylized illustration of an overflowing inbox with digital debris, representing overwhelming email volume.
Threat Intelligence

Snow Job: How UNC6692 uses Email Floods and Fake IT Support to Plant Its 'Snow' Malware

Remember when we thought email phishing was the peak of sophisticated social engineering? Think again. UNC6692 just rewrote the playbook, proving the old tricks, when combined with a relentless barrage, can still make for a nasty surprise.

6 min read 3 weeks, 4 days ago
🦠
Ransomware & Malware

EDR Killers: The $100M Problem Hackers Can't Ignore

Forget fancy exploit chains for a moment. The real predictable choke point for ransomware gangs isn't the initial breach; it's disabling your defenses just before the encryptor fires. And the data shows these 'EDR killers' are evolving, not disappearing.

6 min read 1 month, 1 week ago

Categories

Explainers Data Breaches Vulnerabilities & CVEs Ransomware & Malware Nation-State Threats Security Tools Compliance & Policy Cloud Security
Threat Digest

Threat intelligence. Zero noise.

More

  • RSS Feed
  • Sitemap
  • About
  • Editorial Process
  • Advertise

Legal

  • Privacy
  • Terms
  • Work With Us

Our Network

The AI Catchup AI & Machine Learning Threat Digest Cybersecurity Legal AI Beat Legal Tech Fintech Rundown Finance & Banking DevTools Feed Developer Tools Open Source Beat Open Source Fintech Dose Crypto & DeFi Chip Beat Semiconductors AdTech Beat Ad Technology Supply Chain Beat Logistics

© 2026 Threat Digest. All rights reserved.

🏠Home 🔍Search 🔖Saved 📂Categories
Privacy & cookies

We use a privacy-respecting analytics tool to count page views — no personal profiles, no ad tracking, no third-party cookies. Accept to help us understand which stories matter to readers.

Details