The first quarter of 2025 has been a battlefield in the world of cybersecurity. Cybercriminals continued launching aggressive new campaigns and refining their attack methods.
Below is an overview of five notable malware families, accompanied by analyses conducted in controlled environments.
NetSupport RAT Exploiting the ClickFix Technique
In early 2025, threat actors began exploiting a technique

- February 25, 2025
- by Francis Schmuff
- Cyber News
- Less than a minute
- 52 Views
Related Post
- by Francis Schmuff
- April 11, 2025
Paper Werewolf Deploys PowerModul Implant in Targeted Cyberattacks
The threat actor known as Paper Werewolf has been observed exclusively targeting Russian entities with a new implant called PowerModul.
- by Francis Schmuff
- April 11, 2025
Friday Squid Blogging: Squid and Efficient Solar Tech
Researchers are trying to use squid color-changing biochemistry for solar tech. This appears to be new and related research to
- by CDA News Team
- April 11, 2025
CMMC Compliance Becomes Urgent as DoD Finalizes Cybersecurity
CMMC Compliance Becomes Urgent as DoD Finalizes Cybersecurity Rules With the Department of Defense’s new cybersecurity requirements set to appear
- by Francis Schmuff
- April 11, 2025
Fortinet Warns Attackers Retain FortiGate Access Post-Patching via
Fortinet has revealed that threat actors have found a way to maintain read-only access to vulnerable FortiGate devices even after
- by Francis Schmuff
- April 11, 2025
Paper Werewolf Deploys PowerModul Implant in Targeted Cyberattacks
The threat actor known as Paper Werewolf has been observed exclusively targeting Russian entities with a new implant called PowerModul.
- by Francis Schmuff
- April 11, 2025
Friday Squid Blogging: Squid and Efficient Solar Tech
Researchers are trying to use squid color-changing biochemistry for solar tech. This appears to be new and related research to
- by CDA News Team
- April 11, 2025
CMMC Compliance Becomes Urgent as DoD Finalizes Cybersecurity
CMMC Compliance Becomes Urgent as DoD Finalizes Cybersecurity Rules With the Department of Defense’s new cybersecurity requirements set to appear
- by Francis Schmuff
- April 11, 2025
Fortinet Warns Attackers Retain FortiGate Access Post-Patching via
Fortinet has revealed that threat actors have found a way to maintain read-only access to vulnerable FortiGate devices even after