Continuous Malware Research delivering Early Warning, Actionable Intelligence, and Preemptive Protection against emerging cyber threats Worldwide.
A breach of an official SAP npm package does not constitute a mere npm threat. It is a concrete...
The appearance of Vect ransomware on the scene took place in late December 2025. The gang developed...
ADT Data Breach Puts 5.5 Million Customer Records At Risk ADT, a home security systems company,...
What Are UNC6692 and Snow Malware? UNC6692 is the name of the malicious threat group that relies on...
Attack Timeline and Scope Recently, an infected version of the @bitwarden/cli software became...
Apple Alerts Turned into Phishing Bait The malicious email takes form as a valid Apple Security...
BYOVD Attacks Escalate Against EDRs Bring-Your-Own-Vulnerable-Driver attacks are becoming common as...
A New Threat in Microsoft Defender Windows Defender is the antivirus that comes pre-installed in...
Unpacking the Vercel Security Incident The event that took place on 19th April 2026 was caused by...
A new threat called ATHR is changing the voice-phishing landscape. This all-in-one platform...
Full disk encryption on windows depends on BitLocker technology. In plain language, BitLocker...
Critical SharePoint Server Zero-Day Vulnerability A severe deserialization flaw was found in...
Xcitium exists to ensure that people can embrace technology fully, without the shadow of insecurity hanging over them. We’re here to give users the freedom to explore, create, and connect without fear. Whether it’s preventing unknown files from compromising systems or offering innovative approaches to endpoint protection solution, Xcitium’s technology is designed to foster confidence. We believe that by keeping the digital ecosystem secure, we’re directly contributing to human evolution—by enabling people to take full advantage of the tools that define our era.
Book a Demo