More

    Exploits

    New Malware Leverages Windows Character Map to Bypass Windows Defender and Mine Cryptocurrency for The Attackers

    A recently discovered strain of cryptomining malware has captured the attention of security teams worldwide by abusing the built-in Windows Character Map application as...

    Attacks with Stealerium malware spike

    Intrusions deploying the Stealerium information-stealing malware have escalated from May to August following an over a year-long lull, reports ITPro. 

    ‘NotDoor’ malware tied to Russia’s APT28 exploits Microsoft Outlook

    Campaign targets various vertical sectors in multiple NATO-based countries. 

    Cybercriminals ‘Grok’ Their Way Past X’s Defenses to Spread Malware

    Hackers Weaponize Grok to Spread Malware Hackers exploit X’s Grok AI to spread malware via promoted ads, exposing millions to...

    AI-powered PromptLocker ransomware is just an NYU research project — the code worked as a typical ransomware, selecting targets, exfiltrating selected data and encrypting...

    (Image credit: Pexels) ESET said on Aug. 26 that it had discovered the first AI-powered ransomware, which it dubbed PromptLocker, in the wild. But it...

    143,000 Malware Files Target Android and iOS Devices in Q2 2025

    Mobile threats continued to dominate the cyber landscape in the second quarter of 2025, as Kaspersky researchers uncovered nearly 143,000 malicious installation packages for...

    Large language models can execute complete ransomware attacks autonomously, research shows

    Criminals can use artificial intelligence, specifically large language models, to autonomously carry out ransomware attacks that steal personal files and demand payment, handling every...

    TAG-150 Hackers Deploy Custom Malware Families to Target Organizations

    A new and highly sophisticated cyber threat actor, known as TAG-150, has emerged on the global stage, wreaking havoc since March 2025 with a suite...

    TAG-150 Hackers Escalate Attacks with Proprietary Malware Families

    A sophisticated threat actor, TAG-150, active since at least March 2025. Characterized by rapid malware development, technical sophistication, and a sprawling multi-tiered infrastructure, TAG-150...

    Latest articles