Trusted Threat Intelligence

Continuous Malware Research delivering Early Warning, Actionable Intelligence, and Preemptive Protection against emerging cyber threats Worldwide.

Bugra Gonca LinkedIn
Head of ThreatLabs - Xcitium | Building Xcitium’s Patented Security Engines

My Mission: Ending the "Detection" Gamble For years, the cybersecurity industry sold you a lie called "Detection." Our philosophy is simple yet absolute:

Latest Blogs
Critical Windows DNS Client Vulnerability (CVE-2026-41096)
  • May 15, 2026
Critical Windows DNS Client Vulnerability (CVE-2026-41096)

Critical New DNS Client Vulnerability Microsoft’s May 2026 Patch Tuesday included CVE-2026-41096,...

Fake ‘Mac Cleaner’ Google Ads Spread macOS Malware
  • May 14, 2026
Fake ‘Mac Cleaner’ Google Ads Spread macOS Malware

Malicious Ads Lure Mac Users When Mac owners search for terms like “Mac cleaner” or “clear...

Claude AI and Critical Infrastructure: What the Monterrey Water Utility Case Means for AI-Assisted Cyberattacks
  • May 13, 2026
Claude AI and Critical Infrastructure: What the Monterrey Water Utility Case Means for AI-Assisted Cyberattacks

Claude-aided attack stands out since it marks a shift from speculative to real-world use of AI in...

BitUnlocker Bypasses BitLocker: A New Windows 11 Downgrade Attack
  • May 13, 2026
BitUnlocker Bypasses BitLocker: A New Windows 11 Downgrade Attack

BitLocker Under Siege: What is BitUnlocker? BitUnlocker represents a new attack technique that...

Checkmarx Jenkins AST Plugin Hit by Supply Chain Infostealer Attack
  • May 12, 2026
Checkmarx Jenkins AST Plugin Hit by Supply Chain Infostealer Attack

Jenkins remains one of the most popular CI/CD platforms, so its integration with security tools...

TCLBanker Malware: Brazilian Banking Trojan with WhatsApp and Outlook Worms
  • May 11, 2026
TCLBanker Malware: Brazilian Banking Trojan with WhatsApp and Outlook Worms

TCLBanker is a new, sophisticated banking Trojan emerging from Brazil that combines aggressive...

MuddyWater Leverages Microsoft Teams for Credential Theft in False-Flag Ransomware Attack
  • May 08, 2026
MuddyWater Leverages Microsoft Teams for Credential Theft in False-Flag Ransomware Attack

Microsoft Teams Social Engineering Phishing The Iranian-related APT (MuddyWater/Seedworm) targeted...

New ClickFix Attack Uses Fake Disk Cleanup Tools to Steal Data on Mac
  • May 07, 2026
New ClickFix Attack Uses Fake Disk Cleanup Tools to Steal Data on Mac

Fake Mac “Cleanup” Posts Lure Users Attackers are posting phony macOS help guides on popular...

Critical Palo Alto PAN‑OS Flaw (CVE‑2026‑0300) Under Active Exploitation
  • May 06, 2026
Critical Palo Alto PAN‑OS Flaw (CVE‑2026‑0300) Under Active Exploitation

Flaw Overview: Captive Portal Buffer Overflow Palo Alto’s advisory gauge highlights the flaw’s...

Trellix Data Breach: Source Code Repository Hack Explained
  • May 05, 2026
Trellix Data Breach: Source Code Repository Hack Explained

Breach Confirmed: Trellix Code Repository Accessed Trellix recently announced that an unauthorized...

Instructure Data Breach Analysis: What The Canvas Incident And ShinyHunters Claim Mean For Schools
  • May 04, 2026
Instructure Data Breach Analysis: What The Canvas Incident And ShinyHunters Claim Mean For Schools

Why The Instructure Data Breach Matters Now The Instructure data breach matters because Canvas sits...

Official SAP npm Packages Compromised: What The CAP Supply Chain Attack Really Means
  • April 30, 2026
Official SAP npm Packages Compromised: What The CAP Supply Chain Attack Really Means

A breach of an official SAP npm package does not constitute a mere npm threat. It is a concrete...

Why Choose Xcitium

Xcitium exists to ensure that people can embrace technology fully, without the shadow of insecurity hanging over them. We’re here to give users the freedom to explore, create, and connect without fear. Whether it’s preventing unknown files from compromising systems or offering innovative approaches to endpoint protection solution, Xcitium’s technology is designed to foster confidence. We believe that by keeping the digital ecosystem secure, we’re directly contributing to human evolution—by enabling people to take full advantage of the tools that define our era.

Book a Demo
Awards & Recognition

Industry-leading certifications and compliance standards