Trusted Threat Intelligence

Continuous Malware Research delivering Early Warning, Actionable Intelligence, and Preemptive Protection against emerging cyber threats Worldwide.

Bugra Gonca LinkedIn
Head of ThreatLabs - Xcitium | Building Xcitium’s Patented Security Engines

My Mission: Ending the "Detection" Gamble For years, the cybersecurity industry sold you a lie called "Detection." Our philosophy is simple yet absolute:

Latest Blogs
EvilTokens And Microsoft Device Code Phishing: Why OAuth Token Theft Is Scaling Fast
  • April 02, 2026
EvilTokens And Microsoft Device Code Phishing: Why OAuth Token Theft Is Scaling Fast

The EvilTokens approach is taking the Microsoft device code phishing into a more ‘productized’...

Axios npm Supply Chain Compromise: How A Trusted Dependency Became A Cross-Platform Backdoor
  • April 01, 2026
Axios npm Supply Chain Compromise: How A Trusted Dependency Became A Cross-Platform Backdoor

One of the most popular HTTP client libraries in use, Axios, with more than 100 million weekly...

DeepLoad Malware Uses ClickFix and WMI Persistence to Steal Browser Credentials
  • March 31, 2026
DeepLoad Malware Uses ClickFix and WMI Persistence to Steal Browser Credentials

Why This DeepLoad Campaign Stands Out DeepLoad is a newly observed malware loader that shows a...

European Commission Data Breach After Europa.eu Hack: What Happened and Why It Matters
  • March 30, 2026
European Commission Data Breach After Europa.eu Hack: What Happened and Why It Matters

A confirmed European Commission data breach linked to the Europa.eu web platform has put a...

Critical Zero-Click Prompt-Injection Flaw Discovered in Claude Chrome Extension
  • March 27, 2026
Critical Zero-Click Prompt-Injection Flaw Discovered in Claude Chrome Extension

A Stealthy Vulnerability in Claude’s Browser Extension Recently a...

Cloudflare Services Abused: How Cybercriminals Hide Phishing and Malware
  • March 26, 2026
Cloudflare Services Abused: How Cybercriminals Hide Phishing and Malware

Cloudflare has become a double-edged sword. Criminals are increasingly hiding phishing sites and...

LiteLLM Supply Chain Breach: How a Compromised Scanner Delivered a Backdoor
  • March 25, 2026
LiteLLM Supply Chain Breach: How a Compromised Scanner Delivered a Backdoor

LiteLLM was recently hit by a sophisticated supply-chain attack. Two backdoored versions (1.82.7...

FBI Warns of Handala Hackers Using Telegram for Malware Attacks
  • March 24, 2026
FBI Warns of Handala Hackers Using Telegram for Malware Attacks

Why the FBI’s Handala Warning Matters for Everyday Tech Users A recent alert from the FBI...

VoidStealer Malware Targets the Chrome Master Key With a Debugger Trick
  • March 23, 2026
VoidStealer Malware Targets the Chrome Master Key With a Debugger Trick

Why VoidStealer and the Chrome Master Key Matter Now VoidStealer is just one of a rising tide of...

Microsoft Releases Emergency KB5085516 Update to Fix Sign-In Failures
  • March 23, 2026
Microsoft Releases Emergency KB5085516 Update to Fix Sign-In Failures

Microsoft has been facing a technical challenge in recent times, which has affected the daily...

LeakNet Ransomware Escalates: ClickFix Lures and Deno In-Memory Loader
  • March 18, 2026
LeakNet Ransomware Escalates: ClickFix Lures and Deno In-Memory Loader

Recent investigations show that LeakNet now delivers malicious “ClickFix” prompts via...

Live Chat Phishing: How Attackers Exploit SaaS Support Tools for Data Theft
  • March 17, 2026
Live Chat Phishing: How Attackers Exploit SaaS Support Tools for Data Theft

Why Live Chat Phishing is a Growing Threat Attackers are constantly finding new ways to make...

Why Choose Xcitium

Xcitium exists to ensure that people can embrace technology fully, without the shadow of insecurity hanging over them. We’re here to give users the freedom to explore, create, and connect without fear. Whether it’s preventing unknown files from compromising systems or offering innovative approaches to endpoint protection solution, Xcitium’s technology is designed to foster confidence. We believe that by keeping the digital ecosystem secure, we’re directly contributing to human evolution—by enabling people to take full advantage of the tools that define our era.

Book a Demo
Awards & Recognition

Industry-leading certifications and compliance standards