Skip to content
Threat Digest
Explainers Data Breaches Vulnerabilities & CVEs Ransomware & Malware
Nation-State Threats Security Tools Compliance & Policy Cloud Security Threat Intelligence

#malware-signing

Diagram showing a cybercriminal uploading a file to the Fox Tempest service, which then signs it and returns it as seemingly legitimate software.
Ransomware & Malware

Fox Tempest: Malware-as-a-Service Dismantled [Microsoft Report]

Cybercriminals are getting slicker. Microsoft just busted Fox Tempest, a service that made malware look like the real deal.

5 min read 2 days, 19 hours ago
A graphic illustration representing a digital lock being broken with code fragments flying out.
Ransomware & Malware

Malware Signing Service Abusing Microsoft Platform Disrupted

A significant operation enabling cybercriminals to digitally sign malware as if it were legitimate software has been dismantled. This attack vector highlights how even trusted cloud services can be subverted, impacting user trust and system security.

6 min read 3 days, 6 hours ago
Diagram illustrating the Fox Tempest malware signing as a service infrastructure, showing admin and customer roles.
Threat Intelligence

Fox Tempest: How Malware Found a Legitimate Address

Ever wonder how malware slips past your defenses, looking utterly legitimate? It turns out there's a whole underground industry dedicated to giving it a convincing digital handshake. Fox Tempest, a cybercrime-as-a-service provider, was just busted for doing exactly that, and the implications are chilling.

6 min read 3 days, 20 hours ago

Categories

Explainers Data Breaches Vulnerabilities & CVEs Ransomware & Malware Nation-State Threats Security Tools Compliance & Policy Cloud Security
Threat Digest

Threat intelligence. Zero noise.

More

  • RSS Feed
  • Sitemap
  • About
  • Editorial Process
  • Advertise

Legal

  • Privacy
  • Terms
  • Work With Us

Our Network

The AI Catchup AI & Machine Learning Threat Digest Cybersecurity Legal AI Beat Legal Tech Fintech Rundown Finance & Banking DevTools Feed Developer Tools Open Source Beat Open Source Fintech Dose Crypto & DeFi Chip Beat Semiconductors AdTech Beat Ad Technology Supply Chain Beat Logistics

© 2026 Threat Digest. All rights reserved.

🏠Home 🔍Search 🔖Saved 📂Categories
Privacy & cookies

We use a privacy-respecting analytics tool to count page views — no personal profiles, no ad tracking, no third-party cookies. Accept to help us understand which stories matter to readers.

Details