Continuous Malware Research delivering Early Warning, Actionable Intelligence, and Preemptive Protection against emerging cyber threats Worldwide.
A massive data exposure has reportedly impacted 17.5 million Instagram accounts. Learn about the...
Discover the tactics, victims, and statistics of Lynx Ransomware. Learn how this double-extortion...
Explore dependency hijacking in AI agents, a critical supply chain risk. Learn how malicious...
The browser extension of the Trust Wallet was compromised by a supply chain worm attack; hence,...
DarkSpectre, the Chinese threat actor, was responsible for infecting 8.8 million browsers through...
Anubis ransomware is a new RaaS combining file encryption and data wiping. Learn about its...
The current discussion examines the growing trend surrounding quishing (QR code phishing). Why...
Find out why Conditional Access (CA) policies in Microsoft 365 safeguard the issue of tokens but...
A critical vulnerability in n8n (CVE-2025-68613) provides remote code execution and system...
The Nissan and Red Hat breach exposed 21,000 customers. Learn why the automotive software supply...
NanoRemote is a Windows backdoor that uses Google Drive as a covert command-and-control channel,...
Two critical authentication bypass vulnerabilities have been actively exploited in the threat...
Xcitium exists to ensure that people can embrace technology fully, without the shadow of insecurity hanging over them. We’re here to give users the freedom to explore, create, and connect without fear. Whether it’s preventing unknown files from compromising systems or offering innovative approaches to endpoint protection solution, Xcitium’s technology is designed to foster confidence. We believe that by keeping the digital ecosystem secure, we’re directly contributing to human evolution—by enabling people to take full advantage of the tools that define our era.
Book a Demo