Skip to content
Threat Digest
Explainers Data Breaches Vulnerabilities & CVEs Ransomware & Malware
Nation-State Threats Security Tools Compliance & Policy Cloud Security Threat Intelligence

#c2-infrastructure

Conceptual image representing a hidden network connection within a blockchain structure.
Ransomware & Malware

TrickMo Banker Hides on TON Blockchain: A New C2 Game

Android banker TrickMo has adopted The Open Network (TON) blockchain for covert command-and-control, making it harder to detect and block. This isn't just an update; it's an architectural shift in how malware operates.

5 min read 1 week, 5 days ago
Illustration of GitHub logo morphing into a malware command channel with LNK files and PowerShell scripts
Threat Intelligence

Hackers Turn GitHub into Malware's Secret Batphone—South Korea in the Crosshairs

What if the code repo you trust is quietly beaming your data to hackers? A slick GitHub malware campaign proves even dev havens aren't safe.

4 min read 1 month, 2 weeks ago

Categories

Explainers Data Breaches Vulnerabilities & CVEs Ransomware & Malware Nation-State Threats Security Tools Compliance & Policy Cloud Security
Threat Digest

Threat intelligence. Zero noise.

More

  • RSS Feed
  • Sitemap
  • About
  • Editorial Process
  • Advertise

Legal

  • Privacy
  • Terms
  • Work With Us

Our Network

The AI Catchup AI & Machine Learning Threat Digest Cybersecurity Legal AI Beat Legal Tech Fintech Rundown Finance & Banking DevTools Feed Developer Tools Open Source Beat Open Source Fintech Dose Crypto & DeFi Chip Beat Semiconductors AdTech Beat Ad Technology Supply Chain Beat Logistics

© 2026 Threat Digest. All rights reserved.

🏠Home 🔍Search 🔖Saved 📂Categories
Privacy & cookies

We use a privacy-respecting analytics tool to count page views — no personal profiles, no ad tracking, no third-party cookies. Accept to help us understand which stories matter to readers.

Details