Trusted Threat Intelligence

Continuous Malware Research delivering Early Warning, Actionable Intelligence, and Preemptive Protection against emerging cyber threats Worldwide.

Bugra Gonca LinkedIn
Head of ThreatLabs - Xcitium | Building Xcitium’s Patented Security Engines

My Mission: Ending the "Detection" Gamble For years, the cybersecurity industry sold you a lie called "Detection." Our philosophy is simple yet absolute:

Latest Blogs
Official SAP npm Packages Compromised: What The CAP Supply Chain Attack Really Means
  • April 30, 2026
Official SAP npm Packages Compromised: What The CAP Supply Chain Attack Really Means

A breach of an official SAP npm package does not constitute a mere npm threat. It is a concrete...

Vect 2.0 Case Study: When Ransomware Evolves into an Unintended Wiper
  • April 29, 2026
Vect 2.0 Case Study: When Ransomware Evolves into an Unintended Wiper

The appearance of Vect ransomware on the scene took place in late December 2025. The gang developed...

ADT Data Breach: 5.5 Million Records Exposed In Identity-Driven Attack
  • April 28, 2026
ADT Data Breach: 5.5 Million Records Exposed In Identity-Driven Attack

ADT Data Breach Puts 5.5 Million Customer Records At Risk ADT, a home security systems company,...

New ‘Snow’ Malware Threat Distributed via Microsoft Teams
  • April 27, 2026
New ‘Snow’ Malware Threat Distributed via Microsoft Teams

What Are UNC6692 and Snow Malware? UNC6692 is the name of the malicious threat group that relies on...

Bitwarden CLI Supply-Chain Attack Steals Developer Credentials
  • April 24, 2026
Bitwarden CLI Supply-Chain Attack Steals Developer Credentials

Attack Timeline and Scope Recently, an infected version of the @bitwarden/cli software became...

Apple Account Change Notifications Exploited in Phishing Scam
  • April 22, 2026
Apple Account Change Notifications Exploited in Phishing Scam

Apple Alerts Turned into Phishing Bait The malicious email takes form as a valid Apple Security...

Reverse-Engineering a 0-Day: PoisonX BYOVD Driver Bypasses CrowdStrike EDR
  • April 21, 2026
Reverse-Engineering a 0-Day: PoisonX BYOVD Driver Bypasses CrowdStrike EDR

BYOVD Attacks Escalate Against EDRs Bring-Your-Own-Vulnerable-Driver attacks are becoming common as...

Red Sun: Microsoft Defender Flaw Under Attack
  • April 20, 2026
Red Sun: Microsoft Defender Flaw Under Attack

A New Threat in Microsoft Defender Windows Defender is the antivirus that comes pre-installed in...

Vercel Security Breach: What Developers Need to Know
  • April 20, 2026
Vercel Security Breach: What Developers Need to Know

Unpacking the Vercel Security Incident The event that took place on 19th April 2026 was caused by...

ATHR: An AI-Powered Vishing Platform
  • April 17, 2026
ATHR: An AI-Powered Vishing Platform

A new threat called ATHR is changing the voice-phishing landscape. This all-in-one platform...

Windows BitLocker Vulnerability Exposes Secure Boot Flaw
  • April 16, 2026
Windows BitLocker Vulnerability Exposes Secure Boot Flaw

Full disk encryption on windows depends on BitLocker technology. In plain language, BitLocker...

Critical Zero-Day RCE in On-Premises SharePoint Servers
  • April 15, 2026
Critical Zero-Day RCE in On-Premises SharePoint Servers

Critical SharePoint Server Zero-Day Vulnerability A severe deserialization flaw was found in...

Why Choose Xcitium

Xcitium exists to ensure that people can embrace technology fully, without the shadow of insecurity hanging over them. We’re here to give users the freedom to explore, create, and connect without fear. Whether it’s preventing unknown files from compromising systems or offering innovative approaches to endpoint protection solution, Xcitium’s technology is designed to foster confidence. We believe that by keeping the digital ecosystem secure, we’re directly contributing to human evolution—by enabling people to take full advantage of the tools that define our era.

Book a Demo
Awards & Recognition

Industry-leading certifications and compliance standards