malware

Preview image for: Malicious Claws: Bing Search Poisoning Leads to Fake OpenClaw Installers on GitHub, Delivering Malware

Malicious Claws: Bing Search Poisoning Leads to Fake OpenClaw Installers on GitHub, Delivering Malware

Beware: Bing search results for OpenClaw led users to malicious GitHub repositories installing info-stealers and RATs, not legitimate software.
Preview image for: XWorm 7.2: Sophisticated Phishing Campaign Leverages Excel Exploits and JPEG Camouflage for PC Hijack

XWorm 7.2: Sophisticated Phishing Campaign Leverages Excel Exploits and JPEG Camouflage for PC Hijack

New phishing campaign deploys XWorm 7.2 via malicious Excel files, hiding malware in JPEGs and processes to steal data.
Preview image for: AI Assistants as Covert C2 Relays: A New Frontier in Evasive Malware Communication

AI Assistants as Covert C2 Relays: A New Frontier in Evasive Malware Communication

Exploiting AI assistants like Grok and Copilot for covert C2, a sophisticated threat demanding advanced cybersecurity defenses.
Preview image for: Malicious MoltBot Onslaught: Weaponized AI Skills Pushing Password Stealers

Malicious MoltBot Onslaught: Weaponized AI Skills Pushing Password Stealers

Over 230 malicious OpenClaw/MoltBot AI skills distributed, pushing password-stealing malware via official registries and GitHub.
Preview image for: ISC Stormcast Insights: Advanced Phishing, Tracking, and 2026 Cyber Defense Strategies

ISC Stormcast Insights: Advanced Phishing, Tracking, and 2026 Cyber Defense Strategies

Analyzing ISC Stormcast (Jan 23, 2026) on advanced phishing, tracking (iplogger.org), malware, and proactive cyber defense strategies.
X
To give you the best possible experience, https://iplogger.org uses cookies. Using means you agree to our use of cookies. We have published a new cookies policy, which you should read to find out more about the cookies we use. View Cookies politics