Continuous Malware Research delivering Early Warning, Actionable Intelligence, and Preemptive Protection against emerging cyber threats Worldwide.
The EvilTokens approach is taking the Microsoft device code phishing into a more ‘productized’...
One of the most popular HTTP client libraries in use, Axios, with more than 100 million weekly...
Why This DeepLoad Campaign Stands Out DeepLoad is a newly observed malware loader that shows a...
A confirmed European Commission data breach linked to the Europa.eu web platform has put a...
A Stealthy Vulnerability in Claude’s Browser Extension Recently a...
Cloudflare has become a double-edged sword. Criminals are increasingly hiding phishing sites and...
LiteLLM was recently hit by a sophisticated supply-chain attack. Two backdoored versions (1.82.7...
Why the FBI’s Handala Warning Matters for Everyday Tech Users A recent alert from the FBI...
Why VoidStealer and the Chrome Master Key Matter Now VoidStealer is just one of a rising tide of...
Microsoft has been facing a technical challenge in recent times, which has affected the daily...
Recent investigations show that LeakNet now delivers malicious “ClickFix” prompts via...
Why Live Chat Phishing is a Growing Threat Attackers are constantly finding new ways to make...
Xcitium exists to ensure that people can embrace technology fully, without the shadow of insecurity hanging over them. We’re here to give users the freedom to explore, create, and connect without fear. Whether it’s preventing unknown files from compromising systems or offering innovative approaches to endpoint protection solution, Xcitium’s technology is designed to foster confidence. We believe that by keeping the digital ecosystem secure, we’re directly contributing to human evolution—by enabling people to take full advantage of the tools that define our era.
Book a Demo