More

    Exploits

    Global K-12 school ransomware response improving, report finds

    Sixty-seven percent of K-12 schools across 17 countries were able to avert ransomware intrusions prior to data encryption this year, compared with only 14%...

    News-Press & Gazette allegedly compromised by Termite ransomware gang

    Missouri-based media firm News-Press & Gazette Company was claimed to have been breached by the Termite ransomware operation, Cybernews reports. 

    BeaverTail Malware Variant Exploiting Repositories to Target Retail Sector

    North Korean nation-state operators tracked as Contagious Interview and Famous Chollima have refined their BeaverTail and InvisibleFerret malware distribution infrastructure, deploying compiled executables via...

    Undetectable Malware Targeting Crypto Wallet Data Of Job Seekers: Report

    David Okoya 3 min read Benzinga and Yahoo Finance LLC may earn commission or revenue on some items through the links below. An...

    New Innovative FileFix Attack in The Wild Leverages Steganography to Deliver StealC Malware

    New FileFix campaign hides StealC payloads in JPGs, using HTML file uploads and steganography to bypass traditional defenses. 

    What You Need to Know About HybridPetya Ransomware

    Key Takeaways: HybridPetya combines Petya ransomware with NotPetya’s destructive features. It bypasses UEFI Secure Boot using a patched vulnerability. ESET warns it could persist even after OS...

    FileFix campaign delivers StealC infostealer

    Attackers target browsers, crypto wallets, messaging apps, and cloud credentials. 

    iTWire – Infostealer Malware and the Cartelisation of Cybercrime

    Recently the record-breaking leak of over 16 billion passwords in June 2025over 16 billion passwords in June 2025 linked in large part to infostealer infections shows...

    Old file types, new tricks: Attackers turn everyday files into weapons

    Attackers are finding new ways to blend in with everyday business tools, hiding their activity inside formats and processes that workers and IT teams...

    Latest articles